The goal of this research is to develop a numerical model that can be used to simulate the sedimentation process under two scenarios: first, the flocculation unit is on duty, and second, the flocculation unit is out of commission. The general equation of flow and sediment transport were solved using the finite difference method, then coded using Matlab software. The result of this study was: the difference in removal efficiency between the coded model and operational model for each particle size dataset was very close, with a difference value of +3.01%, indicating that the model can be used to predict the removal efficiency of a rectangular sedimentation basin. The study also revealed that the critical particle size was 0.01 mm, which means that most particles with diameters larger than 0.01 mm settled due to physical force, while most particles with diameters smaller than 0.01 mm settled due to flocculation process. At 10 m from the inlet zone, the removal efficiency was more than 60% of the total removal rate, indicating that increasing basin length is not a cost-effective way to improve removal efficiency. The influence of the flocculation process appears at particle sizes smaller than 0.01 mm, which is a small percentage (10%) of sieve analysis test. When the percentage reaches 20%, the difference in accumulative removal efficiency rises from +3.57% to 11.1% at the AL-Muthana sedimentation unit.
Abstract
This study investigated the optimization of wear behavior of AISI 4340 steel based on the Taguchi method under various testing conditions. In this paper, a neural network and the Taguchi design method have been implemented for minimizing the wear rate in 4340 steel. A back-propagation neural network (BPNN) was developed to predict the wear rate. In the development of a predictive model, wear parameters like sliding speed, applying load and sliding distance were considered as the input model variables of the AISI 4340 steel. An analysis of variance (ANOVA) was used to determine the significant parameter affecting the wear rate. Finally, the Taguchi approach was applied to determine
... Show MoreIn this study, the modified Rayleigh-Ritz method and Fourier series are used to determine the thermal buckling behavior of laminated composite thin plates with a general elastic boundary condition applied to in-plane uniform temperature distribution depending upon classical laminated plate theory(CLPT). A generalized procedure solution is developed for the Rayleigh-Ritz method combined with the synthetic spring technique. The transverse displacement of the orthotropic rectangular plates is not a different term as a new shape expansion of trigonometric series. In this solution approach, the plate transverse deflection and rotation due to bending are developed into principle Fourier series with a sufficient smoothness auxi
... Show MoreThis paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.
Finally, all algori
... Show MoreIn this investigation, Rayleigh–Ritz method is used to calculate the natural frequencies of rectangular isotropic and laminated symmetric and anti-symmetric cross and angle ply composite plate with general elastic supports along its edges. Each of the admissible functions here is composed of a trigonometric function and an arbitrary continuous function that is introduced to ensure the sufficient smoothness of the so-called residual displacement function at the edges. Perhaps more importantly, this study has developed a general approach for deriving a complete set of admissible functions that can be applied to various boundary conditions. Several numerical examples are studied to demonstrate the accuracy and convergence of the current s
... Show MoreMutans streptococci (MS) are a group of oral bacteria considered as the main cariogenic organisms. MS consists of several species of genus Streptococcus which are sharing similar phenotypes and genotypes. The aim of this study is to determine the genetic diversity of the core species of clinical strains of Streptococcus mutans, Streptococcus sobrinus and Streptococcus downei by using repitative extragenic palindromic (REP) primer. The DNA of the clinical strains of S. mutans (n=10), S. sobrinus (n=05) and S. downei (n=04) have been employed in the present study, which have been previously isolated from caries active subjects. The DNA of the clinical and reference strains was
... Show MoreThis paper focuses on Load distribution factors for horizontally curved composite concrete-steel girder bridges. The finite-element analysis software“SAP2000” is used to examine the key parameters that can influence the distribution factors for horizontally curved composite steel
girders. A parametric study is conducted to study the load distribution characteristics of such bridge system due to dead loading and AASHTO truck loading using finite elements method. The key parameters considered in this study are: span-to-radius of curvature ratio, span length, number of girders, girders spacing, number of lanes, and truck loading conditions. The results have shown that the curvature is the most critical factor which plays an important
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The inhibitive action of polyvinyl alcohol –sodium nitrite (PVASN) composite on the corrosion of mild steel in simulated cooling water (SCW) has been investigated by weight loss and potentiodynamic polarization. The effect of composite concentration (PVA/SN) , pH, and exposure time on corrosion rate of mild steel were verified using 2 levels factorial design and surface response analysis through weight loss approach, while the electrochemical measurements were used to study the behavior of mild steel in (SCW) with pH between 6 and 8 and in absence and presence of (PVA) in solution containing different concentration of NaNO2. It was verified that all three main variables studied were statistically significant while their interaction is
... Show MoreRecently, the financial mathematics has been emerged to interpret and predict the underlying mechanism that generates an incident of concern. A system of differential equations can reveal a dynamical development of financial mechanism across time. Multivariate wiener process represents the stochastic term in a system of stochastic differential equations (SDE). The standard wiener process follows a Markov chain, and hence it is a martingale (kind of Markov chain), which is a good integrator. Though, the fractional Wiener process does not follow a Markov chain, hence it is not a good integrator. This problem will produce an Arbitrage (non-equilibrium in the market) in the predicted series. It is undesired property that leads to erroneous conc
... Show More