Preferred Language
Articles
/
joe-3004
INTERACTION EFFECTS OF HYDRODYNAMICALLY FULLY DEVELOPED PRIMARY FLOW AND SECONDARY FLOW IN THE THERMAL ENTRANCE REGION OF ANNULAR DUCT
...Show More Authors

Experiments have been conducted to study the local and average heat transfer by mixed
convection for hydrodynamically fully developed, thermally developing and fully developed
laminar upward air flow in an inclined annulus with adiabatic inner cast iron tube and uniform
heated outer aluminum tube with an aspect ratio ( Ω = 0.72) and (L/Dh≈40) for both calming and
test sections). A wide range of Reynolds number from 859 to 2024 has been covered, and heat
flux has been varied from 159 W/m2 to 812 W/m2 (these values of heat flux and Reynolds
number gave Richardson number range from 0.03 to 0.٣٨), with angles of annulus inclination
φ =0o (horizontal position), φ =60o (inclined position), and φ =90o (vertical position). The hydrodynamically fully developed condition has been achieved by using aluminum annulus
(calming section) has the same dimensions as test section and has connected with it by Teflon
piece. The average Nusselt numbers have been correlated with the product of (Richardson
number and Reynolds number) and compared with available literature and showed satisfactory
agreement. The temperature and local Nusselt number profiles results have revealed that the
secondary flows created by natural convection have a significant effect on the heat transfer
process.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy Wavenet (FWN) classifier for medical images
...Show More Authors

 

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.

  In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.

&n

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modules with Chain Conditions on S-Closed Submodules
...Show More Authors

  Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called  s- closed submodule denoted by  D ≤sc W, if D has   no  proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In  this  paper,  we study  modules which satisfies  the ascending chain  conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.

View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Smart Agricultural Technology
Smart fertilizer technologies: An environmental impact assessment for sustainable agriculture
...Show More Authors

The global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Semimaximal Submodules
...Show More Authors

     Let R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if

 the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are  introduced and given some  properties .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Viable Strategies to Increase Clinical Trial Patient Diversity
...Show More Authors

In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
The Iraqi Journal For Information And Documentation Studies
Improving students' cognitive abilities using modern technologies: an experimental study
...Show More Authors

The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 07 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Some Results on Pure Submodules Relative to Submodule
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.

View Publication Preview PDF
Crossref