This paper reports a numerical study of flow behaviors and natural convection heat transfer characteristics in an inclined open-ended square cavity filled with air. The cavity is formed by adiabatic top and bottom walls and partially heated vertical wall facing the opening. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. A computer program to solve mathematical model has been developed and written as a code for MATLAB software. Results in the form of streamlines, isotherms, and average Nusselt number, are obtained for a wide range of Rayleigh numbers 103-106 with Prandtl number 0.71
... Show MoreAbstract:
The objective of this study, is to attempt to explain the reality of the Structural Imbalances in the Iraqi Economy during the period of research, by providing a quantitative analysis of the most important types of Imbalances, Which are represented by the disruption in the Productive Structure, the imbalance of the structure of Public Budget, and the imbalance of the Structure of Trade. The problem of the research, is the fact that the economy structure in Iraq has long suffered from an Imbalances in its economic structure, which are represented in the unequal relations between its constituent elements, according to the proportions levels defined by the economic theory.
... Show MoreThe mysterious letters, the philosophy of existence and the meaning of these letters in the Qur'an is one of the mysterious issues that has always occupied the minds of Interpreters. Each Interpreter has tried to provide his own interpretation and understanding of these mysterious letters. Since these letters are part of the surah of the Qur'an and at the same time, the appearance of these letters, unlike other verses, does not indicate meaning, the commentators have approached these verses with their preconceptions. In this article, an attempt has been made to investigate the role of pre-interpreters of descriptors in a descriptive and analytical method in finding the meaning of syllables. However, each of them has tried to interpret th
... Show MoreIn this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti
... Show MoreNeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among
Corrosion of steel reinforcement is one of the biggest problems facing all countries in the world like bridges in the beach area and marine constructions which lead to study these problems and apply some economical solutions. According to the high cost of repair for these constructions, were studied the effect of using kind of chemical compounds sodium nitrite(NaNO2) and sodium silicate(Na2SiO3) as corrosion inhibitors admixture for steel bars that immersed partially in electrolyte solution (water + sodium chloride in 3% conc.) (Approximately similar to the concentration of salt in sea water). The two inhibitors above added each one to the electrolyte solution at concentrations (0.5%, 1% and 2%) for both
... Show MoreAn efficient modification and a novel technique combining the homotopy concept with Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced in this paper . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.
Abstract
This research aims to improve the provided health service level inside Baghdad hospitals and the Yarmouk educational, as well as to shed light on the reality of the health service and the quality within the major operations room in both hospitals, as the operations room represent the research community, as was the use of some quality tools Pareto and Ishikawa diagram to measure and assess the level of quality provided, and include research problem to find out what are the problems and obstacles facing the process of improving quality in both hospitals, and whether there are scientifically accurate method to assess the quality of health service in Baghdad's Yarmouk hospital and educational . Where the researcher h
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreAqueous Two Phase System (ATPS) or liquid-liquid extraction is used in biotechnology to recover valuable compounds from raw sources. In Aqueous Two-Phase Systems, many factors influence the Partition coefficient, K, (which is the ratio of protein concentration in the top phase to that in the bottom phase) and the Recovery percentage (Rec%). In this research, two systems of ATPS were used: first, polyethylene glycol (PEG) 4000/Sodium citrate (SC), and the second, PEG8000/ Sodium phosphate (SPH), for the extraction of Bovine Serum Albumin (BSA). The behavior of Rec% and K of pure (BSA) in ATPS has been investigated throughout the study by the effects of five parameters: temperature, concentration of polyethylene glycol (P
... Show More