A low speed open circuit wind tunnel has been designed, manufactured and constructed at the
Mechanical Engineering Department at Baghdad University - College of Engineering. The work is one of
the pioneer projects adapted by the R & D Office at the Iraqi MOHESR. The present paper describes the
first part of the work; that is the design calculations, simulation and construction. It will be followed by a
second part that describes testing and calibration of the tunnel. The proposed wind tunnel has a test
section with cross sectional area of (0.7 x 0.7 m2) and length of (1.5 m). The maximum speed is about (70
m/s) with empty test section. The contraction ratio is (8.16). Three screens are used to minimize flow
disturbances in the test section. The design philosophy is discussed and methods for wind tunnel
calculation are outlined. Simulation of wind tunnel using ANSYS shows no separation of flow along
wind tunnel. Construction steps are also included in present work.
In order to promote sustainable steel-concrete composite structures, special shear connectors that can facilitate deconstruction are needed. A lockbolt demountable shear connector (LB-DSC), including a grout-filled steel tube embedded in the concrete slab and fastened to a geometrically compatible partial-thread bolt, which is bolted on the steel section's top flange of a composite beam, was proposed. The main drawback of previous similar demountable bolts is the sudden slip of the bolt inside its hole. This bolt has a locked conical seat lug that is secured inside a predrilled compatible counter-sunk hole in the steel section's flange to provide a non-slip bolt-flange connection. Deconstruction is achieved by demounting the tube from the t
... Show MoreThis is an open access by CC Attribution-Noncommercial-NoDerivatives 4.0
https://creativecommons.org/licenses/by-nc-nd/4.0
Takfir is an ancient phenomenon that accompanied the emergence of Islam, and this phenomenon took its political dimension during the time of the fourth Rashidi Caliph with the emergence ofthe Kharijites sect that disbelieved many Muslims.
The study started from the hypothesis that "contemporary Islamicmovements and organizations have relied in their takfir on the ideas and fatwas presented by the predecessors which applied ontocontemporary rea
... Show MoreThe aim of this research is to employ the roundhouse strategy to study its impact on the students achievement of the 10th grade in physics and their core thinking. After the application of the research experience and gaining data, which was processed statistically using the statistical packages program (SPSS). The results of the researcher revealed the superiority of the students of the experimental group who studied using the roundhouse strategy on the students of the control group who studied the usual method in the achievement test. As results showed that there were statistically significant differences between the average scores of the experimental group and the average scores of the control group students in the core thinking test and
... Show MoreIlliteracy has spread in the last years, although it was eliminated in the 1980s. The return of illiteracy brings ignorance, illness, backwardness and regression among nations. It has taken many types, mainly alphabetical, scientific and computer illiteracy. Hence, the increasing nature of illiteracy has attracted the attention of governments and societies alike. This may touch the reality of societies starting with their youth unless those, who are in charge, will find workable solutions for the existing problems. The results of the study revealed that there is a real disaster awaiting the next generation after years of stray, and ignorance of the people in charge who are too engaged in getting their privileges to care about this proble
... Show MoreABSTRACT. The reaction between benzil and hexamethylenediamine formed a new ligand [L], [(1Z,3Z)-2,3-diphenyl-5,6,7,8,9,10-hexahydro-1,4-diazecine], of the type [N2], was synthesized by the condensation reaction through Schiff base reaction between benzil and hexamethylenediamine. The new Schiff base ligand reacts with Mnп, Niп and Coп metal ions to give the complexes with the general formula: [M(L)Cl2]. The elemental investigations have been used to analyze the ligand and its complexes by CHN, FT-IR, UV-Vis, TLC, mass spectrum, melting point with the study of biological activity to the formed compounds. From the data obtained, the proposed molecular structure adopts square planar structure about the metal ions. The study reveals
... Show MoreFinancial institutions, including banks, remain a major target for money launderers in order to transfer illegal funds to legitimate funds through limited internal audit procedures and external auditing.
The study is a study of the operations of money laundering and what can be done by the verification efforts when integrated in the fight against them, by analyzing the level of cooperative relationship and communication between them. To achieve the objectives of the study, a questionnaire prepared for this purpose was distributed to an appropriate sample of (60) auditors of the internal audit staff of the Central Bank of Iraq and the external auditors working in the Federal control foundation Accordingly , appropriate methods wer
... Show MoreThe new events in every era are endless, and it is not required of the legal texts to pursue each event by itself and attach to it its ruling.
At the same time, every event or action must have a Shari’a ruling according to the wise Lawgiver, and our scholars have noted this in every event presented to them. ...etc.
It is well known that reaching the legal ruling on a matter, by examining the detailed evidence, is subject to following the path of the rules and regulations specific to the overall evidence, which we organize on the basis of the principles of jurisprudence.
Therefore, any disagreement about the manner or content of these rules will have an impact on the difference of jurists in partial issues, when examining the d
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show More