Preferred Language
Articles
/
joe-521
Using a New Modification on Wind Turbine Ventilator for Improving Indoor Air Quality
...Show More Authors

This paper describes a newly modified wind turbine ventilator that can achieve highly efficient ventilation. The new modification on the conventional wind turbine ventilator system may be achieved by adding a Savonius wind turbine above the conventional turbine to make it work more efficiently and help spinning faster. Three models of the Savonius wind turbine with 2, 3, and 4 blades' semicircular arcs are proposed to be placed above the conventional turbine of wind ventilator to build a hybrid ventilation turbine. A prototype of room model has been constructed and the hybrid turbine is placed on the head of the room roof. Performance's tests for the hybrid turbine with a different number of blades and different values of wind speeds have been conducted. The experimental test results show that the performance of the improved ventilation turbine with three blades is the best. It is found that the maximum rotation speed of the improved turbine is 107rpm, while the air flow rate is 0.0103m3/s and the air change rate per hour is 32.67hr-1, at a wind speed of 3m/s. The proposed design has been achieved an increase in the turbine rotational speed, increase of the extraction rate of the indoor air and the air-changes per hour, provided the requisite ventilation and improved the quality of the indoor air.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Study for Assessment of Cutting Density Effect on Hole Cleaning Efficiency in Inclined and Horizontal Wells
...Show More Authors

The poor hole cleaning efficiency could causes many problems such as high torque, drag, poor hydraulics and pipe stuck. These inherent problems result in an avoidable high operation cost which this study tried to address.  In this study, the effect of cutting density on hole cleaning efficiency in deviated and horizontal wells was investigated. Experiments were conducted using 40 feet (12 m) long of flow loop made from iron and PVC. However, the test section was made from PVC with (5.1m) long and (4” ID) for outer pipe and (2” OD) inner pipe. The cutting transport ratio (CTR) was determined from weight measurements for each test. Cutting Transport Ratio has been investigated for effects of the following parameters; flow rate, cu

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The importance of direct foreign investment on development of Iraqi oil industry for the period (2003-3010)
...Show More Authors

Oil industry played a major role in delineating the course and type o development in both imported and exported Arabic countries alike where its revenues has perform an essential role in forming programs and plans of development on both national and international level in addition to anticipation of future consuming.

Iraq, as an oil producer country with a revenues –based economy depends on oil in building its economy totally including its infrastructure having a the greatest conformed reservoir which make the government budget depends largely on oil revenues where its strategic importance lies in funding all aspects of expenders as it is considered the prime source of foreign currency.  The chall

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Social Responsibility initiatives in Financial Performance on economic unit and create value for it
...Show More Authors

        Many of researchers have written about social responsibility and business strategy and competitive advantage, and they have given particular attention to the relationship between economic and social responsibility , but what is missing in this aspect is how the economic units that use their core competencies to advance social responsibility initiatives so that they can achieve a significant competitive advantage and create value for it ?

The current research aims to verify the view that "the economic and social objectives in the long term is not contradictory in nature but complementary objectives essential", as well as make sure that the s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Fri Dec 20 2019
Journal Name
Iet Circuits, Devices & Systems
Multi‐bit error control coding with limited correction for high‐performance and energy‐efficient network on chip
...Show More Authors

In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Kufa Journal Of Engineering
Numerical Analysis for the Response of Skirt Circular Shallow Footing Resting on Sandy Soil under vertical loads
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Construction And Building Materials
Uni- and tri-axial tests and property characterization for thermomechanical effect on hydrated lime modified asphalt concrete
...Show More Authors

Permanent deformation, fatigue and thermal cracking are the three typical distresses of flexible pavement. Using hydrated lime (HL) into the conventional limestone mineral additive has been widely practiced, including in Europe, to improve the mechanical properties of hot mix asphalt (HMA) concrete and as the result the durability of the constructed pavement. Large number of experimental studies have been reported to find the optimum addition of HL for the improvement on HMA concrete mechanical properties, moisture susceptibility and fatigue resistance. Pavement in service is under complex thermomechanical stress-strain conditions due to coupled atmospheric and surrounding environment temperature variation and the traffic loading. To predic

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref