Preferred Language
Articles
/
8hhje5QBVTCNdQwC8Bpv
Empirical model for predicting slug-pseudo slug and slug-churn transitions of upward air/water flow
...Show More Authors

A pseudo-slug flow is a type of intermittent flow characterized by short, frothy, chaotic slugs that have a structure velocity lower than the mixture velocity and are not fully formed. It is essential to accurately estimate the transition from conventional slug (SL) flow to pseudo-slug (PSL) flow, and from SL to churn (CH), by precisely predicting the pressure losses. Recent research has showed that PSL and CH flows comprise a significant portion of the conventional flow pattern maps. This is particularly true in wellbores and pipelines with highly deviated large-diameter gas-condensate wellbores and pipelines. Several theoretical and experimental works studied the behavior of PSL and CH flows; however, few models have been suggested to predict SL/CH and are very limited for SL/PSL transitions. Based on the experimental data, an empirical model was suggested to predict the SL/PSL/CH transition for air/water upward inclined flow. The proposed model correlates the modified gas Froude number with the inclination angle and modified liquid Froude number. The inclined flow dataset includes 125 data points of SL, PSL, and CH covering angle of inclination (θ) from 2o to 89.4 °with a relatively large pipe diameter (D) of 0.1016 m. The developed model accurately predicted all data and captured the expected influence of inclination angle, pipe diameter, and gas density on the SL/PSL/CH transition. The developed model was tested favorably against three datasets (681 points) collected from twelve independent studies: 549 air/water two-phase points, 65 air/viscous liquid two-phase points, and 67 air/oil/water three-phase points.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Topology-Based Modularity and Modularity Density for Detecting Protein Complexes: A Comparative Study
...Show More Authors

     Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Antimicrobial activity Study Via some new Schiff bases for Trimethoprim
...Show More Authors

This search reports the synthesis of some new series of Schiff base compounds for trimetheprim derivatives which known high been known as a medicinal effectiveness. Trimetheprim was condensed with several substituted aldehydes compounds.(4-dimethyl amine benzaldehyde , propanal , salicaldehyde, 2.4 dimethoxy benzaldehyde and 4- methyl benzaldehyde) to obtain Schiff base products(1a-5a) and several substituted ketones compound (4-aminoacetophenone,4-chloroacetophenone, isobutyleketone, acetylacetone and acetophenone) to obtain Schiff base products(6b-10b) in ethanol in the presence of concentrated sulphuric acid as a catalyst to yield the Schiff base. The structure of synthesized compounds has been established on the basis of their Chemical

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 24 2009
Journal Name
كتاب الوقائع /المؤتمر العلمي الثالث لكلية العلوم جامعة بغداد
Using antibiotics as mutagenic and curing agents for Prodigiosin Production By Serratia marcescens
...Show More Authors

The effect of different antibiotics on growth pigment and plasmid curing of Serratia marcescens were studied, S. marcescens was cultured in media containing(16_500)µg/ml of antibiotics, curing mutants unable to produce prodigiosin and lost one plasmid band were obtained of of ampicillin, amoxillin, antibiotics concentrations (64 500) µg/ml metheprim, ultracloxam, azithromycin, cephalexin and erythromycin treated with (350 500) µg/ml of The mutant cells rose- light color and and refampicin revealed S.marcescens inhibited ciprodar and tetracyclin, lincomycin did not lost the plasmid band chlaforan

Publication Date
Fri Jul 24 2020
Journal Name
Al-kindy College Medical Journal
Comorbidity and Risk Factors for COVID-19 Confirmed Patients in Wasit Province, IRAQ
...Show More Authors

Background: Coronavirus disease 2019 (COVID-19) is
one of the updated challenges facing the whole world.
Objective: To identify the characteristics risk factors that
present in humans to be more liable to get an infection
than others.
Methods: A cross-sectional study was conducted for
positively confirmed 35 patients with polymerase chain
reaction in Wasit province at AL-Zahraa Teaching
Hospital from the period of March 13th till April 20th. All
of them full a questionnaire regarded by risk factors and
other comorbidities. Data were analyzed by SPSS version
23 using frequency tables and percentage. For numerical
data, the median, and interquartile range (IQR) were used.
Differences between categoric

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 15 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Combining Convolutional Neural Networks and Slantlet Transform For An Effective Image Retrieval Scheme
...Show More Authors

In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),

... Show More
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jul 02 2016
Journal Name
Iraqi Medical Journal
Screeing for Hepatitis ( HBs Ag) and Hepatitis C (HCV Ab) Among Dialysis Children.
...Show More Authors

Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Trade relations between Iraq and selected Arab countries for the period 2003 -2013
...Show More Authors

Ping message focused on highlighting the fact commodity trading in Iraq, and increased exposure to world merchandise trade imbalance, which dominate Iraq's foreign trade major commodity is oil, and therefore the inability of Iraq to control financial revenue as a result of the fluctuations in the international market, the shortage of commodity products will lead inevitably to the weakness in the ability of the local market to meet the internal demand and due to the lack of flexible production machine For agricultural, industrial and economic sectors are responding to changes in the domestic or external demand which will open the door to merchandise imports to invade these markets, since the adoption of the Iraq oil exports,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Standards and quality controls for information technology applications to serve the Holy Quran
...Show More Authors

the research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.

To achieve this goal, the researcher has built a list of criteria according to the following steps:

First - identify the key areas covered by the whole list which are:

1 – Standards of system building and implementing with the operating screens.

2 – Standards of display forms including audio and video presentation.

3 – Standards which are related to the program philosophy.

4 - Standards which are related to the program objectives.

... Show More
View Publication Preview PDF