Preferred Language
Articles
/
joe-1713
Influence of Design Efficiency of Water Supply Network Inside Building on its Optimum Usage: Review
...Show More Authors

The water supply network inside the building is of high importance due to direct contact with the user that must be optimally designed to meet the water needs of users.  This work aims to review previous research and scientific theories that deal with the design of water networks inside buildings, from calculating the amount of consumption and the optimal distribution of the network, as well as ways to rationalize the use of water by the consumer.  The process of pumping domestic water starts from water treatment plants to be fed to the public distribution networks, then reaching a distribution network inside the building till it is  provided to the user.  The design of the water supply network inside the building is mainly affected by the amount of water consumed in the building. On this basis, the pipes' dimensions and the water tank's volume are determined. The operating pressure of the water supply network inside the building is calculated to overcome the height difference and the friction inside the pipes and provide sufficient pressure to operate the most remote fixture.  The most important results of the research are that the optimal use of the water distribution network inside the buildings is achieved by the correct design and implementation using skilled labor, materials, and devices of high quality and rationalization of water consumption by the user.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 27 2019
Journal Name
Journal Of Low Power Electronics And Applications
Tolerating Permanent Faults in the Input Port of the Network on Chip Router
...Show More Authors

Deep submicron technologies continue to develop according to Moore’s law allowing hundreds of processing elements and memory modules to be integrated on a single chip forming multi/many-processor systems-on-chip (MPSoCs). Network on chip (NoC) arose as an interconnection for this large number of processing modules. However, the aggressive scaling of transistors makes NoC more vulnerable to both permanent and transient faults. Permanent faults persistently affect the circuit functionality from the time of their occurrence. The router represents the heart of the NoC. Thus, this research focuses on tolerating permanent faults in the router’s input buffer component, particularly the virtual channel state fields. These fields track packets f

... Show More
View Publication
Scopus (14)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The impact of postmodern era art movements on graphic design: بشار شامل الخفاجي
...Show More Authors

In the postmodern era, the graphic design styles showed a new visualization method when the graphic designers had changed the traditional conditions by using design elements with new technics for photos, collage and comics illustration. The researcher assumes that the graphic design styles were affected by the art's movement at that period throw the same perspective of view for the concept presented in the art pieces and their entire message. Therefore, the researcher chooses field was the period of 1945-1970 in the USA for the (pop-art and conceptual-art) and explored the main visual effects that expressed the visual dialogue and compared them with the most common design styles ant the same period and location, the results of selected e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
On the design of the annexation experience between splintered and dissociated sectors
...Show More Authors

The idea of the design of combination Between split – plot and split block means that an experiment conducted with a design

formed by combination Between split – plot and split block, and it presents a precise manner to analytic who aimed to make appropriate statistical analysis for the experiment because such design contains four random errors , it make a high precision rather than another designs. The plan and the theoretical analysis were presented with application   to show its idia and the ability to use it in many fields  especially in agricultural experiments field .

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Iraqi Journal Of Agricultural Sciences, 2018, 49(2), Pp. 179–187
Estimation of some genetic parameters for grain yield and its components of maize under watered and water stress
...Show More Authors

Scopus (8)
Scopus
Publication Date
Wed Jun 01 2022
Journal Name
Civil Engineering Journal
Usage of EB-CFRP for Improved Flexural Capacity of Unbonded Post-Tensioned Concrete Members Exposed to Partially Damaged Strands
...Show More Authors

The study presents the performance of flexural strengthening of concrete members exposed to partially unbonded prestressing with a particular emphasis on the amount (0, 14.2, and 28.5%) of cut strands-symmetrical and asymmetrical damage. In addition to examining the influence of cut strands on the remaining capacity of post-tensioned unbonded members and the effectiveness of carbon fiber reinforced polymer laminates restoration, The investigated results on rectangular members subjected to a four-point static bending load based on the composition of the laminate affected the stress of the CFRP, the failure mode, and flexural strength and deflection are covered in this study. The experimental results revealed that the usage of CFRP la

... Show More
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Improving the Network Lifetime in Wireless Sensor Network for Internet of Thing Applications
...Show More Authors

Mobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Study for Assessment of Cutting Density Effect on Hole Cleaning Efficiency in Inclined and Horizontal Wells
...Show More Authors

The poor hole cleaning efficiency could causes many problems such as high torque, drag, poor hydraulics and pipe stuck. These inherent problems result in an avoidable high operation cost which this study tried to address.  In this study, the effect of cutting density on hole cleaning efficiency in deviated and horizontal wells was investigated. Experiments were conducted using 40 feet (12 m) long of flow loop made from iron and PVC. However, the test section was made from PVC with (5.1m) long and (4” ID) for outer pipe and (2” OD) inner pipe. The cutting transport ratio (CTR) was determined from weight measurements for each test. Cutting Transport Ratio has been investigated for effects of the following parameters; flow rate, cu

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Chemical Methodologies
Design, Synthesis of Imidazolone and Oxazepine Derivatives Bearing Imidazo (2, 1-b) Thiazole along with its Antimicrobial Activity
...Show More Authors

A new methodology was applied to the synthesis of new imidazolones and oxyazepine derivatives containing imidazo thiazole fused rings. Starting with 5-(4-bromo phenyl) imidazo (2, 1-b) thiazole, which was synthesized using the standard procedure, the Carbaldehyed group was introduced at position 6 of 5-(4-bromo phenyl) imidazo (2, 1-b) thiazole. Then, this 6-carbaldehyed derivative was condensed with different substituted aromatic amines to afford new Schiff bases. The latter were cyclized into new oxazepine and imidazolone derivatives by using phthalic anhydride and glycine, respectively. These new derivatives were characterized by using FT-IR, 1HHNMR, and 13CNMR spectra, as well as examined (evaluated) for anti-bacterial and anti-fungal a

... Show More
View Publication Preview PDF
Scopus (12)
Scopus Clarivate
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More