Experiments were conducted to study axial liquid dispersion coefficient in slurry bubble column of 0.15 m inside diameter and 1.6 m height using perforated plate gas distributor of 54 holes of a size equal to 1 mm diameter and with a 0.24 free area of holes to the cross sectional area of the column. The three phase system consists of air, water and PVC used as the solid phase. The effect of solid loading (0, 30 and 60 kg/m3) and solid diameter (0.7, 1.5 and 3 mm) on the axial liquid dispersion coefficient at different axial location (25, 50 and 75 cm) and superficial gas velocity covered homogeneous-heterogeneous flow regime (1-10 cm/s) were studied in the present work. The results show that the axial liquid dispersion coefficient increases with increasing superficial gas velocity, axial distance, solid concentration and an inverse relationship with particles diameter.
Objectives: To evaluate levels of nurses' knowledge about substance abuse at psychiatric teaching hospitals in Baghdad city. Methodology: A descriptive analytical study conducts to meet study objectives during the period from 1-11-2014 To 10-5-2015 The study conduct at 4 teaching hospitals in three department (Baghdad Al Rusafa ,Al Karkh, Medical city) they includ Baghdad teaching hospital, Al Rashad teaching hospital, Ibn Rshud teaching hospital , and Al Kadhumeeain teaching hospital which select according to the study. A random sample of 100 nurses are working in teaching psychiatric hospitals , Al Rashad (6
In this research, the researchers attempted to reveal the non-verbal language in the Holy Qur'an through the hurt of the eye, its communicative effect, and its psychological significance in order to demonstrate the importance of this language. Fold the search ..
Insurance actions has become a task of the vital foundations on which the international economy depends, where its presence helped in the development of economic resources in which human resource is considered the most important of these resources. Insurance companies play the biggest role in protecting this resource and minimizing the impact of the dangers that verify this condition.Human has worked hard to get rid of the dangers and its harm, and to devise many ways to prevent them. A risk management is considered within human’s creations in order to create a society with fewer negative risks impacts.
On this basis, th
... Show MoreAbstract
This Research aims for harnessing critical and innovative thinking approaches besides innovative problem solving tools in pursuing continual quality improvement initiatives for the benefit of achieving operations results effectively in water treatment plants in Baghdad Water Authority. Case study has been used in fulfilling this research in the sadr city water treatment plant, which was chosen as a study sample as it facilitates describing and analyzing its current operational situation, collecting and analyzing its own data, in order to get its own desired improvement opportunity be done. Many statistical means and visual thinking promoting methods has been used to fulfill research task.
... Show Moreفقد تناولت في موضوعي هذه الآية الكريمة فقد جاء في هذه الآية تعليم من الله عز وجل لرسوله (ص) فلكل داع الى الله من أمته, اسلوباٌ يدعوا به الناس ومحاجة الكافرين بالقرآن, وفيها بيان من الله عز وجل بأنه سيري الناس في المستقبل بعض آياته في كونه, وهي آيات دالات على أن القران حق منزل من عند الله جل جلاله, وليس من وضع البشر, فالناس عاجز عن معرفة الآيات الباهرات التي سيريها الله عز وجل للناس في كونه , وقد أخبرهم عنها في القرآ
... Show MoreReceipt date:2/17/2021 acceptance date:3/16/2021 Publishing date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
Objective: This paper investigates the contradictions in the decision-making process of the United States, which historically proven to be successful policies in the short term, but in the long term proven to be wanting and failure. Methodology: The paper uses descriptive, historical, comparative method. A
... Show MoreThe research Reviews the sides of highlight importance of the Nano-Accounting which doing the accounting performance functions fully computerized without the intervention of an accountant, to solve the problem of not keeping up the rationalization of recording and accounting systems, with the rationalization of production which fully computerized.(be invisible and hidden accounting), resulting by linking or interaction of the accounting, additive production system represented three-dimensional printers, open source and recycling. That which result the rationalizing the facilities of production, organization and self-control which derived nanotechnology idea, which aims to minimize materials and change it properties, then view the a
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More