Gaslift reactors are employed in several bioapplications due to their characteristics of cost-effectiveness and high efficiency. However, the nutrient and thermal gradient is one of the obstacles that stand in the way of its widespread use in biological applications. The diagnosis, analysis, and tracking of fluid paths in external draft tube gaslift bioreactor-type are the main topics of the current study. Several parameters were considered to assess the mixing efficiency such as downcomer-to-rizer diameter ratio (Ded/Dr), the position of the diffuser to the height of bioreactor ratio (Pd/Lr), and gas bubble size (Db). The multiple regression of liquid velocity indicates the optimal setting: Ded/Dr is (0.5), Pd/Lr is (0.02), and Db is (400) um. However, for technical and operational reasons, it was necessary to make some changes in the optimal values obtained from the numerical equations. The study also revealed that the size of gas bubbles is the characteristic that has the greatest influence on the dynamic efficiency of the fluid inside the bioreactor, since, reducing the bubble size by half can enhance the improvement rate in the circulation of the liquid up to 35%.
It is no secret to anyone that the Koran is a speech to people, and how it is not a speech to humans is a home to them and suitable for their understandings, and the people of rhetoric mean great care has never been before in the division of the Koranic discourse, followed by linguists and science of the Koran. After reading the letter, I followed it in the Holy Quran, taking advantage of what was written by former writers in language and interpretation. Thanks to God, I have done what I wanted. Perhaps one of the most important reasons that led me to write my research and optional for this topic; is related to the Koran. So I started to develop the research plan, and divided it as I saw it, I started to pave the way, and then divided it
... Show MoreThe progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou
... Show MoreBovine milk is one of the richest nutrients that contain minerals and vitamins that enhance immunity, especially in children, but because many children do not want to drink the raw milk, therefore this study aimed to enhance the sensory characteristics of raw milk by using hibiscus plant extract, which is characterized by red color and distinctive flavor as well as studying the effect of aqueous extract of Hibiscus sabdariffa on inhibiting the growth of microorganisms, by using three concentrations of the aqueous extract (0.5, 1.0 and 1.5%), where the statistical results showed a significant difference (P≤0.05) between the concentrations in color, texture and general acceptance, and the best results appeared when using
... Show MoreThis paper presents a parametric audio compression scheme intended for scalable audio coding applications, and is particularly well suited for operation at low rates, in the vicinity of 5 to 32 Kbps. The model consists of two complementary components: Sines plus Noise (SN). The principal component of the system is an. overlap-add analysis-by-synthesis sinusoidal model based on conjugate matching pursuits. Perceptual information about human hearing is explicitly included into the model by psychoacoustically weighting the pursuit metric. Once analyzed, SN parameters are efficiently quantized and coded. Our informal listening tests demonstrated that our coder gave competitive performance to the-state-of-the- art HelixTM Producer Plus 9 from
... Show MoreAspect categorisation and its utmost importance in the eld of Aspectbased Sentiment Analysis (ABSA) has encouraged researchers to improve topic model performance for modelling the aspects into categories. In general, a majority of its current methods implement parametric models requiring a pre-determined number of topics beforehand. However, this is not e ciently undertaken with unannotated text data as they lack any class label. Therefore, the current work presented a novel non-parametric model drawing a number of topics based on the semantic association present between opinion-targets (i.e., aspects) and their respective expressed sentiments. The model incorporated the Semantic Association Rules (SAR) into the Hierarchical Dirichlet Proce
... Show MoreIn light of increasing demand for energy consumption due to life complexity and its requirements, which reflected on architecture in type and size, Environmental challenges have emerged in the need to reduce emissions and power consumption within the construction sector. Which urged designers to improve the environmental performance of buildings by adopting new design approaches, Invest digital technology to facilitate design decision-making, in short time, effort and cost. Which doesn’t stop at the limits of acceptable efficiency, but extends to the level of (the highest performance), which doesn’t provide by traditional approaches that adopted by researchers and local institutions in their studies and architectural practices, limit
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreDrilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show MoreDrilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show MoreThe purpose of this paper is applying the robustness in Linear programming(LP) to get rid of uncertainty problem in constraint parameters, and find the robust optimal solution, to maximize the profits of the general productive company of vegetable oils for the year 2019, through the modify on a mathematical model of linear programming when some parameters of the model have uncertain values, and being processed it using robust counterpart of linear programming to get robust results from the random changes that happen in uncertain values of the problem, assuming these values belong to the uncertainty set and selecting the values that cause the worst results and to depend buil
... Show More