Preferred Language
Articles
/
joe-85
Energy Analysis of Solar Collector With perforated Absorber Plate
...Show More Authors

The thermal performance of three solar collectors with 3, 6 mm and without perforation absorber plate was assessed experimentally. The experimental tests were implemented in Baghdad during the January and February 2017. Five values of airflow rates range between 0.01 – 0.1 m3/s were used through the test with a constant airflow rate during the test day. The variation of the following parameters air temperature difference, useful energy, absorber plate temperature, and collector efficiency was recorded every 15 minutes. The experimental data reports that the increases  the number of absorber plate perforations with a small diameter is more efficient rather than increasing the hole diameter of the absorber plate with decreasing the perforation numbers. Maximum air temperature difference throughout the solar collector with 3, 6 mm perforations and without perforations are 17, 15, and 12 oC, respectively. Also, it can be concluded that the energy gained from the solar collector with 3 mm perforation absorber plate is 28.2 % more than the energy gained from solar collector without holes per day for 0.1 m3/s airflow rate. The maximum values of the thermal performance curves are 0.67, 0.64, and 0.56 for the solar collector with 3, 6 mm, and without perforations, respectively.

  

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 18 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Performance Analysis of OLSR Protocol in Mobile Ad Hoc Networks
...Show More Authors

Optimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the  Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co

... Show More
Scopus (51)
Crossref (28)
Scopus Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Experimental & Theoretical Analysis of Composite (Polyester & Silicon-Carbide) Cantilever Beam
...Show More Authors

A cantilever beam is made from composite material which is consist of (matrix: polyester) and (particles: Silicon-Carbide) with different volume fraction of particles. A force is applied at the free end of beam with different values. The experimental maximum deflection of beam which occurs at the point of the applied load is recorded. The deflection and slope of beam are analyzed by using FEM modeling. MATLAB paltform is built to assemble the equations, vector and matrix of FEM and solving the unknown variables (deflection and slope) at each node. Also ANSYS platform is used to modeling beam in finite element and solve the problem. The numerical methods are used to compare the results with the theoretical and experimental data. A good ag

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Performance Analysis of Propagation in VHF Military Tactical Communication System
...Show More Authors

The main challenge of military tactical communication systems is the accessibility of relevant information on the particular operating environment required for the determination of the waveform's ideal use. The existing propagation model focuses mainly on broadcasting and commercial wireless communication with a highs transceiver antenna that is not suitable for numerous military tactical communication systems. This paper presents a study of the path loss model related to radio propagation profile within the suburban in Kuala Lumpur. The experimental path loss modeling for VHF propagation was collected from various suburban settings for the 30-88 MHz frequency range. This experiment was highly affected by ecological factors and existing

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 09 2016
Journal Name
Photonic Sensors
Parametric Analysis of NO2 Gas Sensor Based on Carbon Nanotubes
...Show More Authors

View Publication
Scopus (36)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Tue Jan 18 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Performance Analysis of OLSR Protocol in Mobile Ad Hoc Networks
...Show More Authors

Optimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the  Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co

... Show More
View Publication Preview PDF
Crossref (28)
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Iraqi Geological Journal
GEOHISTORY ANALYSIS AND BASIN DEVELOPMENT OF THE LATE BERRIASIAN-APTIAN SUCCESSION, SOUTHERN IRAQ
...Show More Authors

The studied succession is deposited during late Berriasian-Aptian interval, which is represented by the Zubair, Ratawi, Yamama formations. The present study includes stratigraphic development and basin analysis for 21 boreholes (Rachi-1, 2; Rifaei-1, Diwan- 1; Ratawi-1, 2; Halfaia-5; West Qurna 12, 15; Nahr Umr-7,8; Zubair-47,49; North Rumaila- 72, 131, 158; Suba-7; Majnoon-2, 3 and Luhais-2, 12) distributed within 13 oil fields in the southern Iraq. The back-stripping process determined the original direction of basin depocenter for the studied succession. The Yamama basin in the study area stretches from southeast to southwest with single depocenters, it was located in the southeast of the study area near wells Mj-2, Mj-3.NR-8 and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 29 2024
Journal Name
مجلة العلوم التربوية والنفسية
Needs in the stories of the Brothers Grimm (a study in content analysis)
...Show More Authors

The current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Engineering
Analysis of Prosthetic Running Blade of Limb Using Different Composite Materials
...Show More Authors

Prostheses are used as an alternative to organs lost from the body. Flex-Foot Cheetah is considered one of the lower limb prostheses used in high-intensity activities such as running. This research focused on testing two samples of Flex-Foot Cheetah manufactured of two various materials (carbon, glass) with polyester and compare between them to find the foot with the best performance in running on the level of professional athlete. In the numerical analysis, the maximum principal stress, maximum principal elastic strain, strain energy; finally, the blade total deformation were calculated for both feet. In experimental work, the load-deflection test was done for foot to calculate the bending the results were very close to

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Fri May 01 2015
Journal Name
2015 International Symposium On Mathematical Sciences And Computing Research (ismsc)
Analysis of significant dimensions of e-service quality in Malaysian universities
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref