The effect of superficial gas velocity within the range 0.01-0.164 m/s on gas holdup (overall, riser and down comer), volumetric oxygen mass transfer coefficient, liquid circulation velocity was studied in an internal loop concentric tubes airlift reactor (working volume 45 liters). It was shown that as the usg increases the gas holdup and also the liquid circulation velocity increase. Also it was found that increasing superficial gas velocity lead to increase the interfacial area that increases the overall oxygen mass transfer coefficient. The hydrodynamic experimental results were modeled with the available equations in the literature. The predicted data gave an acceptable accuracy with the empirical data.
The final
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreKE Sharquie, AA Noaimi, AM Oweid, JSSDDS, 2009 - Cited by 2
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreIn this study, an unknown force function dependent on the space in the wave equation is investigated. Numerically wave equation splitting in two parts, part one using the finite-difference method (FDM). Part two using separating variables method. This is the continuation and changing technique for solving inverse problem part in (1,2). Instead, the boundary element method (BEM) in (1,2), the finite-difference method (FDM) has applied. Boundary data are in the role of overdetermination data. The second part of the problem is inverse and ill-posed, since small errors in the extra boundary data cause errors in the force solution. Zeroth order of Tikhonov regularization, and several parameters of regularization are employed to decrease error
... Show MoreIncident laser power and concentration effects on fluorescence emission from DCM dye in PMMA polymer have been investigated. Different concentrations of the dye were used. It was found that the fluorescence intensity increased with increasing of the concentration of the dye, with a red shift. In addition, it was found that the fluorescence intensity increased with the increase of the incident laser power I0.
Biped robots have gained much attention for decades. A variety of researches has been conducted to make them able to assist or even substitute for humans in performing special tasks. In addition, studying biped robots is important in order to understand the human locomotion and to develop and improve control strategies for prosthetic and orthotic limbs. Some challenges encountered in the design of biped robots are: (1) biped robots have unstable structures due to the passive joint located at the unilateral foot-ground contact. (2) They have different configuration when switching from walking phase to another. During the singlesupport phase, the robot is under-actuated, while turning into an over-actuated system during the double-support pha
... Show More
