In this work, we calculate and analyze the photon emission from quark and anti-quark interaction during annihilation process using simple model depending on phenomenology of quantum chromodynamic theory (QCD). The parameters, which include the running strength coupling, temperature of the system and the critical temperature, carry information regarding photon emission and have a significant impact on the photons yield. The emission of photon from strange interaction with anti-strange is large sensitive to decreases or increases there running strength coupling. The photons emission increases with decreases running strength coupling and vice versa. We introduce the influence of critical temperature on the photon emission rate in order to facilitate its further applied in photon emission spectrum. Photon emission was increased with large critical temperature MeV comparing with photons emission at critical temperature MeV. We analyze and discuss the sensitive of the emission of photon to photons energy . It increases with decreased photons energy and vice versa. However, the photons emission increases with increases thermal energy of system T = 170 MeV to 270 Mev. It is implied that strength coupling, critical temperature and photons energy can be as important as thermal energy of system for emission of photon.
Developments are carried out to enhance the performance of vertical axis wind turbines (VAWT). This paper studies the performance of the ducted wind turbine with convergent duct (DAWT). Basically, the duct technique is utilized to provide the desired wind velocity facing the turbine. Methodology was developed to estimate the decisive performance parameter and to present the effect of the convergent duct with different inlet angles. The ducted wind turbine was analyzed and simulated using MATLAB software and numerically using ANSYS-Fluent 17.2. Result of both approaches were presented and showed good closeness for the two cases of covering angles 12 and 20 respectively. Results also showed that the convergent duct with an inlet angl
... Show MoreIn this work, an inventive photovoltaic evaporative cooling (PV/EC) hybrid system was constructed and experimentally investigated. The PV/EC hybrid system has the prosperous advantage of producing electrical energy and cooling the PV panel besides providing cooled-humid air. Two cooling techniques were utilized: backside evaporative cooling (case #1) and combined backside evaporative cooling with a front-side water spray technique (case #2). The water spraying on the front side of the PV panel is intermittent to minimize water and power consumption depending on the PV panel temperature. In addition, two pad thicknesses of 5 cm and 10 cm were investigated at three different water flow rates of 1, 2, and 3 lpm. In Case #1,
... Show MoreIn this work, the elemental constituents of smoker and nonsmoker
teeth samples of human were analyzed by Laser induced breakdown
spectroscopy method (LIBS). Many elements have been detected in
the healthy teeth samples, the important once are Ca, P, Mg, Fe, Pb
and Na. Many differences were found between (female and male)
teeth in Ca, P, Mg, Na and Pb contents. The concentrations of most
toxic elements were found significantly in the smoker group. The
maximum concentrations of toxic elements such as Pb, Cd and Co
were found in older male age above 60 year. Also, it was found that
the minimum concentrations of trace elements such as Ca, P and Na
exist in this age group. From these results it is clear that the
Two dimensional meso-scale concrete modeling was used in finite element analysis of plain concrete beam subjected to bending. The plane stress 4-noded quadrilateral elements were utilized to model coarse aggregate, cement mortar. The effect of aggregate fraction distribution, and pores percent of the total area – resulting from air voids entrapped in concrete during placement on the behavior of plain concrete beam in flexural was detected. Aggregate size fractions were randomly distributed across the profile area of the beam. Extended Finite Element Method (XFEM) was employed to treat the discontinuities problems result from double phases of concrete and cracking that faced during the finite element analysis of concrete beam. Crac
... Show MoreIn this research velocity of moving airplane from its recorded digital sound is introduced. The data of sound file is sliced into several frames using overlapping partitions. Then the array of each frame is transformed from time domain to frequency domain using Fourier Transform (FT). To determine the characteristic frequency of the sound, a moving window mechanics is used, the size of that window is made linearly proportional with the value of the tracked frequency. This proportionality is due to the existing linear relationship between the frequency and its Doppler shift. An algorithm was introduced to select the characteristic frequencies, this algorithm allocates the frequencies which satisfy the Doppler relation, beside that the tra
... Show MoreAbstract
The aim of this paper is to investigate and discuss the mechanisms of corrosion of epoxy coatings used for potable water tanks. Two distinct types of Jotun epoxy coatings: Tankguard 412 contained polyamine cured epoxy and Penguard HB contained polyamide cured epoxy, were tested and studied using the electrochemical impedance spectroscopic (EIS) method. The porosity of epoxy coatings was determined using EIS method. The obtained results showed that the two epoxy coatings have excellent behavior when applied and tested in potable water of Basrah city. Polyamine is more resistance to water corrosion compared to polyamide curing epoxy and has high impedance values. Microscopic inspection after te
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThat the essential contribution of this research is a description of how complex systems analysis service of the properties of the queue in Baghdad Teaching Hospital using a technique network is techniques method (Q - GERT) an acronym of the words:
Queuing theory _ Graphical Evaluation and Review Technique
Any method of assessment and review chart where you will be see the movement flow of patients within the system and after using this portal will be represented system in the form of planned network probabilistic analysis and knowledge of statistical distributions appropriate for times of arrival and departure were using the program ready (Win QSB) and simulatio
... Show MoreSoftware Defined Networking (SDN) with centralized control provides a global view and achieves efficient network resources management. However, using centralized controllers has several limitations related to scalability and performance, especially with the exponential growth of 5G communication. This paper proposes a novel traffic scheduling algorithm to avoid congestion in the control plane. The Packet-In messages received from different 5G devices are classified into two classes: critical and non-critical 5G communication by adopting Dual-Spike Neural Networks (DSNN) classifier and implementing it on a Virtualized Network Function (VNF). Dual spikes identify each class to increase the reliability of the classification
... Show More