Preferred Language
Articles
/
joe-614
The Effect of Circular Perforation on a V-Corrugated Fin Performance under Natural Convection
...Show More Authors

An experimental investigation has been made to study the influence of using v-corrugated aluminum fin on heat transfer coefficient and heat dissipation in a heat sink. The geometry of fin is changed to investigate their performance. 27 circular perforations with 1 cm diameter were made. The holes designed into two ways, inline arrangement and staggered in the corrugated edges arrangement. The experiments were done in enclosure space under natural convection. Three different voltages supplied to the heat sink to study their effects on the fins performance. All the studied cases are compared with v-corrugated smooth solid fin. Each experiment was repeated two times to reduce the error and the data recorded after reaching the steady state conditions. The results showed that the v-corrugated fin dissipate heat twice and triple times than flat plate mentioned in past research with the same dimension. Also, the inline perforated fin gave higher enhancement percentage than solid one by 15, 32 and 36% for 110, 150 and 200 V voltages supplied. Finally, the staggered perforation arrangement gave the higher enhancement percentage with 22, 42 and 45% for the same voltages supply.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-kindy College Medical Journal
Familial Pulmonary Alveolar Microlithiasis: A Rare Case Report with Emphasis on Imaging Findings
...Show More Authors

ABSTRACT Pulmonary alveolar microlithiasis is rare infiltrative pulmonary disease characterized by intra-alveoli deposition of microliths. We present a familial case of an adult female with complaint of progressive shortness of breath on exertion. Chest radiograph showed innumerable tiny dense nodules, diffusely involving both lungs mainly the lower zones. High-resolution CT scan illustrated widespread intra-alveolar microliths, diffuse ground-glass attenuation areas and septal thickening predominantly in the basal regions. Chest radiograph is all that is needed for the diagnosis of this case but CT scan was done to demonstrate the extent and severity of this disease

View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Co – odd (even) Sum Degree Edge Domination Number in Graphs
...Show More Authors

 An edge dominating set    of a graph  is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number  is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G.  The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jan 11 2018
Journal Name
Al-khwarizmi Engineering Journal
Control on a 2-D Wing Flutter Using an Adaptive Nonlinear Neural Controller
...Show More Authors

An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref