FG Mohammed, HM Al-Dabbas, Science International, 2018 - Cited by 2
HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Reducing the drag force has become one of the most important concerns in the automotive industry. This study concentrated on reducing drag through use of some external modifications of passive flow control, such as vortex generators, rear under body diffuser slices and a rear wing spoiler. The study was performed at inlet velocity (V=10,20,30,40 m/s) which correspond to an incompressible car model length Reynolds numbers (Re=2.62×105, 5.23×105, 7.85×105 and 10.46×105), respectively and we studied their effect on the drag force. We also present a theoretical study finite volume method (FVM) of solvi
Background: The skull offers a high resistance of adverse environmental conditions over time, resulting in the greater stability of the dimorphic features as compared to other skeletal bony pieces. Sex determination of human skeletal considered an initial step in its identification. The present study is undertaken to evaluate the validity of 3D reconstructed computed tomographic images in sex differentiation by using craniometrical measurements at various parts of the skull. Materials and Method: 3D reconstructed computed tomographic scanning of 100 Iraqi subject, (50 males and 50 females) were analyzed with their age range from20-70 years old. Craniometrical linear measurements were located and marked on both side of the 3D skull images.
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe problem of present study is determined by answering the following questions:
1) What is the effect of using the oral open- ended questions on Students' achievement in the third-stage of Arabic department in the college of Education? 2) What is the effect of the oral open-ended questions on developing the creative thinking of students in
... Show MoreObjective: This study evaluated the effect of immediate dentin sealing on the marginal adaptation of lithium disilicate overlays with three different types of resin-luting agents: preheated composite, dual-cure adhesive resin, and flowable composite. Materials and Methods: Forty-eight maxillary first premolars of similar size were prepared with a butt joint preparation design. The teeth were separated into two primary groups, each with twenty-four teeth: Group DDS: Delay dentin sealing (non-IDS) teeth were not treated. Group IDS: dentin sealing was applied immediately after teeth preparation. Each group was subsequently separated into three separate subgroups. Subgroups (DDS+Phc, IDS+Phc): cemented with preheated composite (Enamel plus HRi,
... Show More