The effect of molecules intersystem crossing (Kisc) on characteristics
(energy and duration) of a Passive Q- switched Laser Pulse has been
studied by mathematical description (rate equations model) for
temporal performance of which was used as a saturable absorber
material (passive switch) with laser. The study shows that the energy
and duration pulse are decreasing while the molecules intersystem
crossing into saturable absorber energy levels is increasing.
Twelve pends were selected and distributed on three verticals transects paths on the Tigers river in Al Rasheed county.Passing through land covers, that classified and covers the whole region. Based on the 8 Landsat of the year 2015. It was oriental classified by using Erdas 10.2 . The pedons were distributed on the area of each varicty of these classes. the series of soil according of the transect series (DW74,MMg,DMu6 , Df96) respectively were represented P1 , P2 , P3 , P4 .
The second transits series(DM97,MM5,DM96,DF115) respectively were represented P5 , P6 , P7 , P8 .The third transits series(DM46,MMg,MF12,MM11) re
... Show MoreThe present work investigates the effect of magneto – hydrodynamic (MHD) laminar natural convection flow on a vertical cylinder in presence of heat generation and radiation. The governing equations which used are Continuity, Momentum and Energy equations. These equations are transformed to dimensionless equations using Vorticity-Stream Function method and the resulting nonlinear system
of partial differential equations are then solved numerically using finite difference approximation. A thermal boundary condition of a constant wall temperature is considered. A computer program (Fortran 90) was built to calculate the rate of heat transfer in terms of local Nusselt number, total mean Nusselt number, velocity distribution as well as te
A cut-off low is a closed low with a low value of geopotential height at the upper atmospheric levels that has been fully detached (cut-off) from the westerly flow and move independently. A cut-off low causes extreme rainfall events in the mid-latitudes regions. The main aim of this paper is to investigate the cut-off low at 500 hPa over Iraq from a synoptic point of view and the behavior of geopotential height at 500 hPa. To examine the association of the cut-off low at 500 hPa with rainfall events across Iraq, two case studies of heavy rainfall events from different times were conducted. The results showed that the cut-off low at 500 hPa with a low value of geopotential height will strengthen the low-pressure system at the surface, lea
... Show MoreThe transfer of training process occupies a great importance in achieving the ultimate goal of participating in the training programs , it is sure that this does not take place without the support of the working environment for trainees, and The research aims to personification role the work environment characteristics of supporting the transfer of training.
The research problem is the weakness transfer of training to the work en
... Show MoreGas and downhole water sink assisted gravity drainage (GDWS-AGD) is a promising gas-based enhanced oil recovery (EOR) process applicable for reservoirs associated with infinite aquifers. However, it can be costly to implement because it typically involves the drilling of multiple vertical gas-injection wells. The drilling and well-completion costs can be substantially reduced by using additional completions for gas injection in the oil production wells through the annulus positioned at the top of the reservoir. Multi-completion-GDWS-AGD (MC-GDWS-AGD) can be configured to include separate completions for gas injection, oil, and water production in individual wells. This study simulates
The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThis paper presents ABAQUS simulations of fully encased composite columns, aiming to examine the behavior of a composite column system under different load conditions, namely concentric, eccentric with 25 mm eccentricity, and flexural loading. The numerical results are validated with the experimental results obtained for columns subjected to static loads. A new loading condition with a 50 mm eccentricity is simulated to obtain additional data points for constructing the interaction diagram of load-moment curves, in an attempt to investigate the load-moment behavior for a reference column with a steel I-section and a column with a GFRP I-section. The result comparison shows that the experimental data align closely with the simulation
... Show MoreThe study was reflection of the impact of the widespread use of polymer Novolak composite reinforced Glass fiber and Asbestos fiber once again with weight fraction 60% on the physical properties, which included (Hardness, Compressive deformation, compressive modulus of elasticity, Flexural modulus of elasticity, Resilience modulus, the maximum of Flexural strength, Flexural strain energy and Shear strength inner layers); it is known how much important the media as a source of bacterial contamination, which contributes directly or indirectly in the process of aging of these materials. These Novolak composite reinforced, prepared by weight fraction of (10%) and (14%) of the Hexamethylene-tetraamine (HMTA) hardener material. It
... Show More