Abstract
In order to make an improvement associated with rotating biological contactor (RBC), a new design of biofilm reactor called as Rotating perforated disc biological contactor (RPBC) was developed in which the rotating discs are perforated. The transfer of oxygen from air to wastewater was investigated. Mass-transfer coefficient (KLa) in the liquid phase was determined by measuring the rate transfer of oxygen. A laboratory scale of (RPBC) consisted of a semicircular trough was used with a working capacity of 40 liters capacity of liquid. Synthetic wastewater was used as a liquid phase, while air was used as a gas phase.
The effects of m
... Show MoreThe deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show MoreThe unsteady state laminar mixed convection and radiation through inclined
cylindrical annulus is investigated numerically. The two heat transfer mechanisms of
convection and radiation are treated independently and simultaneously. The outer
cylinder was kept at a constant temperature while the inner cylinder was heated with
constant heat flux. The study involved numerical solution of the governing equations
which are continuity, momentum and energy equations using finite difference method
(FDM), where the body fitted coordinate system (BFC) was used to generate the grid
mesh for computational plane. A computer program (Fortran 90) was built to calculate
the bulk Nusselt number (Nub) after reaching steady state con
The present work presents a new experimental study of the enhancement of turbulent
convection heat transfer inside tubes for combined thermal and hydrodynamic entry length of one
popular “turbulator” (twisted tape with width slightly less than internal tube diameter) inserted for
fire tube boilers. Cylindrical combustion chamber was used to burn (1.6 to 7kg/h) fuel oil #2 to
deliver hot gases with ranges of Reynolds number (10500 to 21700), and (11400 to 24150) for both
empty and inserted tube respectively.A uniform wall temperature technique was used by keeping
approximately constant water temperature difference (25ºC) between inlet and exit cooling water in
parallel flow shell and tube heat exchanger. The test
This research aims to demonstrate the nature and concept of the Corona pandemic, its implications for the global economy, and the management and performance of companies in particular. Additionally, the research intends to measure the impact of the Corona pandemic on companies' financial performance. Listed on the Iraqi Stock Exchange, which has finished compiling its year-end financial statements for 2019-2020. The investigation arrived at several findings, the most significant of which was that most businesses were not prepared for such a crisis technologically or to develop human resources to deal with this pandemic. In addition, most companies experienced a decrease in their financial performance as a direct result of the Corona pandemi
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.