Preferred Language
Articles
/
joe-1704
Independent Thermal Network Through Thermal Synergy Between Four Architectural Units
...Show More Authors

The manifestations of climate change are increasing with the days: sudden rains and floods, lakes that evaporate, rivers that experience unprecedentedly low water levels, and successive droughts such as the Tigris, Euphrates, Rhine, and Lape rivers. At the same time, energy consumption is increasing, and there is no way to stop the warming of the Earth's atmosphere despite the many conferences and growing interest in environmental problems. An aspect that has not received sufficient attention is the tremendous heat produced by human activities. This work links four elements in the built environment that are known for their high energy consumption (houses, supermarkets, greenhouses, and asphalt roads) according to what is known as the energy synergy to share them within a thermal network independent of the national network. This research concluded that an asphalt road with a length of 6 km is sufficient to heat more than 800 homes, in addition to valuable benefits accrued by hot countries, such as maintaining the quality of the asphalt layer, prolonging its life, and reducing traffic accidents. The supermarket, which needs cooling every day of the year, can meet its energy needs for cooling in the winter by heating the Greenhouse, while the heat flux is stored for each of the greenhouses and the supermarkets for the rest of the year in the thermal tank (TESS).

لتدفق الحراري لكل من الدفيئة والسوبر ماركت لبقية العام في الحرارية. خزان (TESS).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Determination of Best Location for Elevated Tank in Branched Network
...Show More Authors

The research focuses on determination of best location of high elevated tank using the required head of pump as a measure for this purpose. Five types of network were used to find the effect of the variation in the discharge and the node elevation on the best location. The most weakness point was determined for each network. Preliminary tank locations were chosen for test along the primary pipe with same interval distance. For each location, the water elevation in tank and pump head was calculated at each hour depending on the pump head that required to achieve the minimum pressure at the most weakness point. Then, the sum of pump heads through the day was determined. The results proved that there is a most economical lo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
The Influence of Politics on Architectural Thought A Descriptive and Analytical Study of the Effect of Political Ideology on the Achieved Architecture (Berlin City as an Example)
...Show More Authors

The research investigates the political effect and its directions on the architectural thoughts and its achievements and how can this political system affect all fields of life in communities including architectural urban design. The problem of the research lies in the ambiguity effects of the ideological national directions of the Nazi Party on the architecture and urban design of the city of Berlin, then determining the aims of the research to discuss the concepts of politics and architecture and their relation to the way of thinking that plays a role in the process of design that works on property and achieving the suitable urban environments for those communities. After that, the Nazi's party's thought would be studied and analyzed,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Measurable Mistakes in Architecture the Effect of Designer's Experience on the Propagation of Mistakes in Architectural Design - Residential Buildings in Al Sulaymaniyah City as a Case Study
...Show More Authors

The importance of physical and nonphysical architectural design values made architectural designers need good experience to be experts of architectural values reasonably without neglecting any value in the design process.  The importance of such values made that ignoring any values and mistakes occurs in the design process. Simultaneously, architectural designers' different nature and the difference in their experiences are causing different understandings of the design values, thus causing architectural mistakes. The research problem appears from the randomly propagating of mistakes in contemporary architecture, which is about to become a phenomenon in Al Sulaymaniyah city. The research aims to find the main reason

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Laminar Forced Convection of Dusty Air through Porous Media in a Vertical Annulus
...Show More Authors

An experimental and numerical study has been carried out to investigate the forced convection heat transfer by clean or dusty air in a two dimensional annulus enclosure filled with porous media (glass beads) between two vertical concentric cylinders. The outer cylinder is of (82 mm) outside diameters and the inner cylinder of (27 mm) outside diameter. Under steady state condition; the inner cylinder surface is maintained at a high temperature by applying a uniform heat flux and the outer cylinder surface at an ambient temperature. The investigation covered values of input power of (6.3, 4.884, 4.04 and 3.26 W), Reynolds number values of (300, 700, 1000, 1500, and 2000) and dust ratio values (density number N) of (2, 4, 6 and 8). A comput

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Chemphyschem
Spherical Aromaticity of Tetrahedral Pnictogens Through <i>Off</i> ‐Nucleus Isotropic Magnetic Shielding
...Show More Authors

This work revealed the spherical aromaticity of some inorganic E4 cages and their protonated E4H+ ions (E=N, P, As, Sb, and Bi). For this purpose, we employed several evaluations like (0D-1D) nucleus independent chemical shift (NICS), multidimensional (2D-3D) off-nucleus isotropic shielding σiso(r), and natural bond orbital (NBO) analysis. The magnetic calculations involved gauge-including atomic orbitals (GIAO) with two density functionals B3LYP and WB97XD, and basis sets of Jorge-ATZP, 6-311+G(d,p), and Lanl2DZp. The Jorge-ATZP basis set showed the best consistency. Our findings disclosed non-classical aromatic characters in the above molecules, which decreased from N to Bi cages. Also, the results showed more aromaticity in E4 than E4H+

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Opcion
Enhancing islamic concepts through English children’s literature: Al-Ibtila, the test of patience
...Show More Authors

Allah, in his Holy Quran introduced great prophet stories so as to learn from. The greatness of these stories lies in Allah himself being the author. He portrays his characters, lays the plot, defines the tests and Al- Ibtilla, provides ways of being patient, using Duaa to end all hard tests and generously describing the greatness of his rewards to all those who are patient. The purpose of this research is to study selected English prophet stories for children on three levels, the stories ability to convey lessons and Islamic teachings to children who do not speak Arabic, the stories portray the Islamic concept of patience, the teaching and learning styles andstrategies that Allah uses with each prophet. The concept of patience is defined a

... Show More
Scopus
Publication Date
Mon May 01 2017
Journal Name
The Journal Of Immunology
Resveratrol improves a murine model of asthma through alterations in the gut microbiome
...Show More Authors
Abstract<p>Asthma is a condition characterized by bronchial spasms, inflammation, and mucous hypersecretion which leads to difficulties in respiration. Asthmatic patients are usually presented with recurrent attacks of coughing, wheezing, and shortness of breath which could be life-threatening. More than three million cases of asthma in the United States are diagnosed annually. Resveratrol, a polyphenolic stilbene, is known to be useful in controlling asthmatic attacks via different molecular mechanisms within the lung epithelium and infiltrating immune cells. However, few studies mentioned the effect of resveratrol on the microbiome in ovalbumin-induced asthma mouse model. In this study, we ind</p> ... Show More
View Publication Preview PDF
Crossref (1)
Crossref