Preferred Language
Articles
/
joe-2185
Experimental and Numerical Analysis of Incompressible Flow over an Iced Airfoil
...Show More Authors

Determining the aerodynamic characteristics of iced airfoil is an important step in aircraft design.  The goal of this work is to study experimentally and numerically an iced airfoil to assess the aerodynamic penalties associated with presence of ice on the airfoil surface. Three iced shapes were tested on NACA 0012 straight wing at zero and non-zero angles of attack, at Reynolds No. equal to (3.36*105). The 2-D steady state continuity and momentum equations have been solved utilizing finite volume method to analyze the turbulent flow over a clean and iced airfoil. The results show that the ice shapes affected the aerodynamic characteristics due to the change in airfoil shape. The experimental results show that the horn iced airfoil consumes more power than the other shapes of ice, its value was (44.4W). The horn iced shape has the worst effect on the airfoil than the other shapes. The present results are compared with previously reported results; it is found there is a very good agreement between them. A comparison between the experimental and computational results of the presented work were pursing the same behavior.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 01 2008
Journal Name
Al-khwarizmi Engineering Journal
New Adaptive Data Transmission Scheme Over HF Radio
...Show More Authors

Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.

An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetics and Mass Transfer Study of Oleic Acid Esterification over Prepared Nanoporous HY zeolite
...Show More Authors

A mathematical model was proposed to study the microkinetics of esterification reaction of oleic acid with ethanol over prepared HY zeolite catalyst. The catalyst was prepared from Iraqi kaolin source and its properties were characterized by different techniques. The esterification was done under different temperature (40 to 70˚C) with 6:1 for molar ratio of ethanol to oleic acid and 5 % catalyst loading.    The microkinetics study was done over two period of time each period was examined individually to calculate the reaction rate constant and activation energy. The impact of the mass transfer resistance to the reactant was also investigated; two different studies have been accomplished to do this purpose.    The e

... Show More
View Publication
Crossref (10)
Crossref
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetics and Mass Transfer Study of Oleic Acid Esterification over Prepared Nanoporous HY zeolite
...Show More Authors

A mathematical model was proposed to study the microkinetics of esterification reaction of oleic acid with ethanol over prepared HY zeolite catalyst. The catalyst was prepared from Iraqi kaolin source and its properties were characterized by different techniques. The esterification was done under different temperature (40 to 70˚C) with 6:1 for molar ratio of ethanol to oleic acid and 5 % catalyst loading.

   The microkinetics study was done over two period of time each period was examined individually to calculate the reaction rate constant and activation energy. The impact of the mass transfer resistance to the reactant was also investigated; two different studies have been accomplished to do this purpose.

&nb

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
Influence of Solar and Geomagnetic Activity on the Ionospheric Sporadic-E Layer Over Baghdad
...Show More Authors
Abstract<p>This study examines the monthly mean diurnal variations of the ionospheric sporadic E (Es) layer’s critical frequency (<italic>foEs</italic>) and virtual height (<italic>h′Es</italic>) above Baghdad city (latitude 33.3˚N, longitude 44.4˚E) during Solar Cycle 22 (1988–1995). The analysis examines their correlation with solar activity, represented by sunspot numbers, and geomagnetic disturbances, particularly during the descending phase of the cycle. The findings revealed that <italic>foEs</italic> values were the highest during the solar maximum years (1989–1991), aligning with increased sunspot numbers and geomagnetic activity due to coronal mas</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Taking Over The Judiciary By Women And The Position Of Law From That: مثالا
...Show More Authors

لمقدمة

     الحمد لله رب العالمين والصلاة والسلام على سيد الأنبياء والمرسلين نبينا محمد صلى الله عليه وسلم وعلى  واصحابه أجمعين  ومن تبعهم وأهتدى بهداهم الى يوم الدين اما بعد :

        فوظيفة القضاء وظيفة سامية يراد منها اقامة العدل ولا يستقيم حالهم الا به دفعاّ للظلم ، ولقد اولى النبي صلى الله عليه وآله وسلم ومن بعده الخلفاء الراشدون

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
An Asymptotic Analysis of the Gradient Remediability Problem for Disturbed Distributed Linear Systems
...Show More Authors

The goal of this work is demonstrating, through the gradient observation of a   of type linear ( -systems), the possibility for reducing the effect of any disturbances (pollution, radiation, infection, etc.) asymptotically, by a suitable choice of related actuators of these systems. Thus, a class of  ( -system) was developed based on finite time  ( -system). Furthermore, definitions and some properties of this concept -system and asymptotically gradient controllable system ( -controllable) were stated and studied. More precisely, asymptotically gradient efficient actuators ensuring the weak asymptotically gradient compensation system ( -system) of known or unknown disturbances are examined. Consequently, under convenient hypo

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
An excerpt on the analysis of correlate constructions: Exkurs zur Analyse der Korrelatkonstruktionen
...Show More Authors

The main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu Sep 09 2021
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation,
The Violation of Religious Human Rights: A sample Analysis of an Offensive Image of Islamic Concept
...Show More Authors

The purpose of this paper is to investigate Religious Human Rights Violations. Religious liberty is essential for everyone, everywhere. Because religion is significant to everyone, everywhere. Humans are religious by nature. Our nature drives us to seek answers to deep questions about ultimate things. We cannot live a fully human life unless we are free to seek those answers and live according to the truths we discover. In this study, the researcher used Marsh and White model for analysis A sample of an offensive image of an Islamic concept from the book "Mohammad believes it or else." this book is a comic book written by pseudonym Abdullah Aziz and published by Crescent Moon Publishing company. The book is marked with anti- Mohammad, preju

... Show More
Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of internal control system over according misleading accounting information
...Show More Authors

Abstract

The economic and financial crises in the world economy series led to increased awareness of the importance of the internal control system, because it is one of the main pillars of any economic unit, as it works to verify the application of policies, regulations and laws and verification of asset protection from theft and embezzlement procedures, it is also working on trust accounting information imparted through the validation of accounting information, analyze and detect the misleading.

The existence the internal control system a factor in many of the accounting practices that limit the ability of the administration to produce misleading financial reporting

The

... Show More
View Publication Preview PDF
Crossref