Preferred Language
Articles
/
joe-2183
A study of the Effect of Air Inlet and Exit on Indoor Air Movement
...Show More Authors

This work consists of a numerical simulation to predict the velocity and temperature distributions, and an experimental work to visualize the air flow in a room model. The numerical work is based on non-isothermal, incompressible, three dimensional, k turbulence model, and solved using a computational fluid dynamic (CFD) approach, involving finite volume technique to solve continuity, momentum and energy equations, that governs the room’s turbulent flow domain. The experimental study was performed using (1/5) scaled room model of the actual dimensions of the room to simulate room air flow and visualize the flow pattern using smoke generated  from burnt herbs and collected in a smoke generator to delivered through the prototype room. The numerical results were compared with those obtained from experiments, the correspondence between numerical and experimental was fairly good and also, a fair comparison was found with other workers in this field.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
E3s Web Of Conferences
History of the impact of radiation on the environment: Hiroshima bomb
...Show More Authors

The history of the impact of nuclear radiation on the environment, as illustrated by the Hiroshima bombing, reveals a multifaceted interplay of scientific, ecological, and ethical dimensions. From the historical context and immediate environmental consequences to long-term ecological effects and human health implications, the effects of nuclear radiation are pervasive. Comparatively analyzed with other nuclear incidents, case studies of affected ecosystems, and through education, ongoing challenges and opportunities toward nuclear technology are revealed. Moreover, it is through the echoes of past nuclear events that lessons were learned which until today guide current efforts on striking a balance between technological advancement

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Aug 30 2025
Journal Name
مجلة منوال للدراسات التربوية والنفسية
The Negative Impact of Media on the Educational Identity of Society
...Show More Authors

This research aims the effects of negative media on the educational identity of community. Whereas display the concept of educational identity and its basic components, as well as the role of educational institutions for example the school and the family in form it and reinforcing this identity to individuals. The study showcasing the harmful impact of both traditional and modern media on identity and values, spotlight several examples like the promotion of consumerism and materialism through television programs. which results in the young people to adopt materialistic values like simplicity. The study concludes that media is a double-edged weapon: it can instill virtues and support education if used duly, but it can also weaken the educat

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 24 2026
Journal Name
Hammurabi Journal For Studies
(The impact of legislative drafting on the achievement of electoral justice)
...Show More Authors

View Publication
Publication Date
Tue May 30 2023
Journal Name
Basrah Arts Journal
The impact of Mesopotamian myths on the drawings of Al-Wasiti
...Show More Authors

Al-Wasiti's drawings are the first attempt to document the Arab landscape more than 778 years ago. These drawings were associated with a fine literary material, and the relationships between words and poetic sentences are matched by artistic, aesthetic and color relations in drawing, as they are all outputs of a sense that agreed in creativity and differed in the language of expression. Al-Wasiti was creative in drawing these events. Islamic painting has a goal that differs from the goals of the painting arts that preceded it or its contemporary, as it tends to “beautification” only. This is achieved by true copying from nature, just as it is achieved by drawing what is transmitted from nature, transforming and refining it. The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 18 2020
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
THE COMPARISON OF THE METHODS ESTIMATING THE FRACTIONAL DIFFERENCES OF PARAMETER AND ITS DEPENDENCE ON ESTIMATION THE BEST LINEAR MODEL OF TIME SERIES IN THE ENVIRONMENTAL FIELD
...Show More Authors

View Publication
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Journal Of Economics And Administrative Sciences
Nadaraya-Watson Estimation of a Circular Regression Model on Peak Systolic Blood Pressure Data
...Show More Authors

Purpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
...Show More Authors

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Efficacy of Saccharomyces cerevesiae on promoting growth in tomato: Nahida M.Saleh |Adnan A. Issa
...Show More Authors

This study was conducted to evaluate the efficacy of Saccharomyces cerevesiae as a growth promoting agent in tomato. Soaking the seeds in yeast suspension at 5 g/L for 12h increased germination percentage, root length, root fresh and dry weight, plant height, foliage fresh and dry weight, attained 88.5% ; 8.1 cm ; 84.3 mg ; 7.03 mg ; 10.75 cm ; 839 mg and 37.75 mg compared with 80% ; 5.33 cm ; 39 mg ; 4.8 mg ; 7.35 cm ; 608 mg and 25.5 mg in seedlings grown from non treated seeds respectively. Similar results were obtained with seedling from seeds soaked in S. cerevesiae filtrate for 12 hrs. with values of 77.5% ; 6.875 cm ; 91.5 mg ; 7.5 mg ; 9.5 cm ; 777 mg and 40.35 mg compared to 66% ; 5.8 cm ; 57.7 mg ; 5.03 mg ; 5.9 cm ; 493 mg

... Show More
View Publication
Crossref