The analysis, behavior of two-phase flow incompressible fluid in T-juction is done by using "A Computational Fluid Dynamic (CFD) model" that application division of different in industries. The level set method was based in “Finite Element method”. In our search the behavior of two phase flow (oil and water) was studed. The two-phase flow is taken to simulate by using comsol software 4.3. The multivariable was studying such as velocity distribution, share rate, pressure and the fraction of volume at various times. The velocity was employed at the inlet (0.2633, 0.1316, 0.0547 and 0.0283 m/s) for water and (0.1316 m/s) for oil, over and above the pressure set at outlet as a boundary condition. It was observed through the program
... Show MoreThis paper deals with numerical study of the flow of stable and fluid Allamstqr Aniotina in an area surrounded by a right-angled triangle has touched particularly valuable secondary flow cross section resulting from the pressure gradient In the first case was analyzed stable flow where he found that the equations of motion that describe the movement of the fluid
Mefenamic acid belongs to non-steroidal anti-inflammatory drugs that are used widely for the treatment of analgesia. Our aim from this study is to establish a new assay for the quantitative determination of mefenamic acid (MFA) in the pharmaceutical sample by two sensitive and rapid flow injection-fluorometric methods. A homemade fluorometer was used in fluorescence measurements, which using solid-state laser diode 405 and 532 nm as a source, combined with a continuous flow injection technique. The first method depends on the effect of MFA on calcein blue (CLB) fluorescence at 405 nm. Another method is a study of rhodamine-6G (Rh-6G) fluorescence after adding MFA, and recording at 532 nm. Optimum parameters as fluorescent dye concen
... Show MoreZinc oxide thin films were deposited by chemical spray pyrolysis onto glass substrates which are held at a temperature of 673 K. Some structural, electrical, optical and gas sensing properties of films were studied. The resistance of ZnO thin film exhibits a change of magnitude as the ambient gas is cycled from air to oxygen and nitrogen dioxide
In wide range of chemical, petrochemical and energy processes, it is not possible to manage without slurry bubble column reactors. In this investigation, time average local gas holdup was recorded for three different height to diameter (H/D) ratios 3, 4 and 5 in 18" diameter slurry bubble column. Air-water-glass beads system was used with superficial velocity up to 0.24 m/s. the gas holdup was measured using 4-tips optical fiber probe technique. The results show that the axial gas holdup increases almost linearly with the superficial gas velocity in 0.08 m/s and levels off with a further increase of velocity. A comparison of the present data with those reported for other slurry bubble column having diameters larger than
... Show MoreNon-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreOne wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.