Preferred Language
Articles
/
joe-2965
INVESTIGATION OF TWISTED TAPE TURBULATOR FOR FIRE TUBE BOILER Part I. Heat Transfer
...Show More Authors

The present work presents a new experimental study of the enhancement of turbulent
convection heat transfer inside tubes for combined thermal and hydrodynamic entry length of one
popular “turbulator” (twisted tape with width slightly less than internal tube diameter) inserted for
fire tube boilers. Cylindrical combustion chamber was used to burn (1.6 to 7kg/h) fuel oil #2 to
deliver hot gases with ranges of Reynolds number (10500 to 21700), and (11400 to 24150) for both
empty and inserted tube respectively.A uniform wall temperature technique was used by keeping
approximately constant water temperature difference (25ºC) between inlet and exit cooling water in
parallel flow shell and tube heat exchanger. The test tube consisted of smooth carbon steel tube of
(2400mm) long and (52mm) internal diameter. This test tube instrumented to derive local heat
transfer coefficient and local flue gasses static pressure.The experimental results show that for the
same fuel consumption, twisted tape insert with (H/D = 11.15) enhanced the mean Nusselt number
in (75.2%), (68.8%), (49.8%), (40.3%), and (16.7%) for fuel consumption (7kg/h), (6.16kg/h),
(4.5kg/h), (3.24kg/h), and (1.6kg/h) respectively.A set of empirical correlations that permit the
evaluation of the mean Nusselt number (for developing and fully developed region), and average
Nusselt number (for developed region) for empty and inserted tube are generated for engineering
applications.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Al-academy
Develop design interior spaces for children's theater halls in Baghdad: إخلاص عبد سلمان
...Show More Authors

The research is marked by (Development Design Interior spaces for children's theater halls in the city of Baghdad). Which consists of four chapters, namely, the first chapter the research problem and the need for him, which included identifying the research problem and of poor achievement of aesthetic values and functional at the scene of the child and its significance in that it is a way of cultural entertainment education of the child and its objectives as it aims to evelop interiors for children's theater, and its limits. Theater Magic Lantern in the city of Baghdad, the second chapter addressed the theoretical framework, which consists of the psychology of the child, and space Children's Theatre and types, forms of children's theater

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 10 2018
Journal Name
In Book: Challenges In Mechanics Of Time-dependent Materials, Volume 2edition: 1stchapter: 11
A Case Study to Evaluate Live Load Distributions for Pre-stressed RC Bridge
...Show More Authors

Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Synthesis and Antibacterial Evaluation for Some New Schiff-bases Derived from P-aminoacetanilide
...Show More Authors

Derivatives of Schiff-bases possess a great importance in pharmaceutical chemistry. They can be used for synthesizing different types of bioactive compounds. In this paper, derivatives of new Schiff bases have been synthesized from several serial steps. The acid (I) was synthesized from the reaction of dichloroethanoic acid with 2 moles of p-aminoacetanilide. New acid (I) converted to its ester (II) via the reaction of (I) with dimethyl sulphate in the present of anhydrous of sodium carbonate and dry acetone. Acid hydrazide (III) has been synthesized by adding 80% of hydrazine hydrate  to the new ester using ethanol as a solvent. The last step included the preparation of new Schiff-bases (IV-VIII) by the reaction of acid hydrazide with app

... Show More
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
New Common Fixed Points for Total Asymptotically Nonexpansive Mapping in CAT(0) Space
...Show More Authors

      Strong and ∆-convergence for a two-step iteration process utilizing asymptotically nonexpansive and total asymptotically nonexpansive noneslf mappings in the CAT(0) spaces have been studied. As well, several strong convergence theorems under semi-compact and condition (M) have been proved. Our results improve and extend numerous familiar results from the existing literature.

View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
Mask technique in the poem "Christ after the crucifixion" for Bder Shaker Al_Sayab
...Show More Authors

Research summary

Perhaps the methods of mask that Arab poets resorted to in our time are due to the conditions of oppression and political and social repression that the Arab poet suffered from; So he strived to circumvent it, and it became a justification for hiding behind it. The research is available on a number of topics that lead to the definition of the mask technique and the beginning of its prevalence in Arabic literature after the Second World War, especially in recent decades by benefiting from historical stories, fairy tales and legends of all kinds. As well as defining the mask idiomatically and linguistically, and the beginning of its use in ancient religious rituals, and the special place it had in Greek plays. Poets

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Eurasian Journal Of Biosciences
Utilizing remote sensing for studying Al-Saadya Marsh in the period 1987-2017
...Show More Authors

The marshes are one of the important environmental features affecting human and animal systems, so the studying of changes they undergo is one of the important topics. This study is concerned with the changes occurring in the Al Saadya marsh for the period from 1987 to 2017 exclusively in the winter season (the marshes’ revival season in Iraq revive). In order to inspect the changes in this marsh, we choose 7 years to cover the study period as a criterion years, namely 1987, 1990, 1995, 2000, 2007, 2014 and 2017. The “Maximum Likelihood” classifier was used to separate the stacked land cover features, where the minimum overall accuracy ratio that recorded for all years of study was 96%. The results revealed that Al-Saadya marsh went t

... Show More
Publication Date
Sat Oct 18 2025
Journal Name
Pattern Recognition And Artificial Intelligence
Utilizing Energy-Efficient Deep Learning Technique for Age Estimation Through a Hybrid Methodology
...Show More Authors

This study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Quadrupole Moment & Deformation Parameter for Even-Even 38Sr (A=76-102) Nuclide
...Show More Authors

View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref