The accuracy of the Moment Method for imposing no-slip boundary conditions in the lattice Boltzmann algorithm is investigated numerically using lid-driven cavity flow. Boundary conditions are imposed directly upon the hydrodynamic moments of the lattice Boltzmann equations, rather than the distribution functions, to ensure the constraints are satisfied precisely at grid points. Both single and multiple relaxation time models are applied. The results are in excellent agreement with data obtained from state-of-the-art numerical methods and are shown to converge with second order accuracy in grid spacing.
A load flow program is developed using MATLAB and based on the Newton–Raphson method,which shows very fast and efficient rate of convergence as well as computationally the proposed method is very efficient and it requires less computer memory through the use of sparsing method and other methods in programming to accelerate the run speed to be near the real time.
The designed program computes the voltage magnitudes and phase angles at each bus of the network under steady–state operating conditions. It also computes the power flow and power losses for all equipment, including transformers and transmission lines taking into consideration the effects of off–nominal, tap and phase shift transformers, generators, shunt capacitors, sh
A novel analytical method is developed for the determination of azithromycin. The method utilizes continuous flow injection analysis to enhance the chemiluminescence system of luminol, H2O2, and Cr(III). The method demonstrated a linear dynamic range of 0.001–100 mmol L-1 with a high correlation coefficient (r) of 0.9978, and 0.001–150 mmol L-1 with a correlation coefficient (r) of 0.9769 for the chemiluminescence emission versus azithromycin concentration. The limit of detection (L.O.D.) of the method was found to be 18.725 ng.50 µL−1 based on the stepwise dilution method for the lowest concentration within the linear dynamic range of the calibration graph. The relative standard deviation (R.S.D. %) for n = 6 was less than 1.2%
... Show MoreThis paper deals with the Magnetohydrodynyamic (Mill)) flow for a viscoclastic fluid of the generalized Oldroyd-B model. The fractional calculus approach is used to establish the constitutive relationship of the non-Newtonian fluid model. Exact analytic solutions for the velocity and shear stress fields in terms of the Fox H-function are obtained by using discrete Laplace transform. The effect of different parameter that controlled the motion and shear stress equations are studied through plotting using the MATHEMATICA-8 software.
Chromatographic and spectrophotometric methods for the estimation of mebendazole in
pharmaceutical products were developed. The flow injection method was based on the oxidation of
mebendazole by a known excess of sodium hypochlorite at pH=9.5. The excess sodium hypochlorite is then
reacted with chloranilic acid (CAA) to bleach out its color. The absorbance of the excess CAA was recorded
at 530 nm. The method is fast, simple, selective, and sensitive. The chromatographic method was carried out
on a Varian C18 column. The mobile phase was a mixture of acetonitrile (ACN), methanol (MeOH), water
and triethylamine (TEA), (56% ACN, 20% MeOH, 23.5% H2O, 0.5% TEA, v/v), adjusted to pH = 3.0 with
1.0 M hy
We demonstrate a behavior of laser pulse grows through fiber laser inside and output cavity with a soliton fiber laser based on the multi-wall carbon nanotube saturable absorber (SA), we investigate the effects of a saturable absorber parameter on the mode-locking of a realistic Erbium fiber ring laser. Generalized nonlinear Schrodinger equation including the nonlinear effects as gain dispersion, second anomalous group velocity dispersion (GVD), self phase modulation (SPM), and two photon absorption used to describe pulse evolution. An analytical method has been used to understand and to quantify the role of the SA parameter on the propagation dynamics of pulse laser. We compute the chirp, power, width and phase of the soliton for range
... Show MoreThe research seeks to find the relationship between psychological flow and futuristic thinking among postgraduate students. To this end, the researchers have made up two scales: one scale to measure the psychological flow which consisted of (32) items and the other to measure the futuristic thinking included (39) items which were distributed into three domains. As to collect the required data, the two scales had applied on a sample comprised (200) postgraduate students. The findings revealed that there is a correlation between psychological flow and futuristic thinking. The researcher recommended the coming studies take the relationship between psychological flow and psychological happiness.
A vector in a separable infinite dimensional Hilbert space is called disk-cyclic for bounded operator if the orbit α : 0, α∈;|∝| 1is dense in. The useful tool used to discover codisk-cyclic operation is called the disk-cyclic Criterion. In this paper we will show that some equivalent conditions of the
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More