This paper is concerned with the numerical solutions of the vorticity transport equation (VTE) in two-dimensional space with homogenous Dirichlet boundary conditions. Namely, for this problem, the Crank-Nicolson finite difference equation is derived. In addition, the consistency and stability of the Crank-Nicolson method are studied. Moreover, a numerical experiment is considered to study the convergence of the Crank-Nicolson scheme and to visualize the discrete graphs for the vorticity and stream functions. The analytical result shows that the proposed scheme is consistent, whereas the numerical results show that the solutions are stable with small space-steps and at any time levels.
Transport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.
Audio security is an important aspect in various areas of communication. This paper deals with audio encryption as many of the data communication depends on audio data. In this paper, a new proposal of audio encryption system has been introduced. The system can be divided into two phases, the first phase focuses on generating a high-quality Pseudo Random Number generator (PRNGs) using elementary, periodic and hybrid rules of cellular automata (CA). The system suggests a new combination of CA rules in an endeavor to provide high randomness and to improve the strength of the proposed cryptosystem. Whereas the second phase produces the Enhanced Rivest Cipher 5 (ERC5) algorithm which employs the generated Random Number Sequence (RNS) i
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreThe plasma source can restrict the motion of charges that are localizing in the non equilibrium distribution of charge energy and reducing the electrons transport across magnetic field . The electrons & ions motion are controlled by ambipolar electric field and charge–atom collision . the source density for a given electron temperature and a given ion are considered to evaluate the diffusion coefficient . the ambipolar diffusion coefficient and the cross field diffusion coefficient for charge transfer are calculated through magnetized plasma in a uniform magnetic field , and an approximation ambipolar diffusion coefficient is evaluated. The result, showes how the diffusion process is gradually im
... Show MoreThe study dealt with The impact of dangerous goods Transportation for Maritime carrier responsibility, the study was exposed to the definition of dangerous goods. the study also dealt with the impact of IMDG code on the responsibility of the carrier, and the duties of the parties, as the study spotlights The duty of the carrier to prepare a compatible ship for dangerous goods transport, as well as the duty of the carrier to preserve the goods while highlighting to the difference in this obligation while transporting dangerous goods, and the study also reviewed the duties of the shipper, for example, his duty to inform the carrier with the dangerous nature of the goods and the role of IMDG code in dealing with the danger of these goods. t
... Show MoreBackground: Guidelines for blood products transfusion are needed to avoid unnecessary blood transfusion in acute and chronic anaemias to minimize complications.
Objective: To evaluate the practice of blood transfusion in Baghdad Teaching Hospital.
Patients and methods: One hundred and sixty adults Iraqi patients, who had blood transfusion, were selected randomly from different wards of Baghdad Teaching Hospital including General Medicine (GM), General Surgery (GS), Gynecology/Obstetrics (G/O), forty patients from each ward, from October 2011 to October 2012. Collected data included age, gender, type of ward, indication for transfusion, pre-transfusion packed cell volume (PCV) and hemoglobin (Hb), type (whole blood or red blood cell
The feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec
The preparation of tin metal from stannous chloride solution by wet method in the presence of aluminum powder as a reducing agent is studied. The preparation is commenced through a reduction step in the presence of reducing agent followed by smelting step at elevated temperature in a programmable electrical furnace. In the reduction step, preliminary experiments are conducted to study the effect of initial acidity, time of addition of the aluminum powder and excess amount of reducing agent on the conversion of stannous to tin metal. Three different parameters are studied through smelting step, these are : heating rate, temperature and residence time.
To characterize the product, different instrumental analyses are used:
... Show MoreThe goal of this research is to develop a numerical model that can be used to simulate the sedimentation process under two scenarios: first, the flocculation unit is on duty, and second, the flocculation unit is out of commission. The general equation of flow and sediment transport were solved using the finite difference method, then coded using Matlab software. The result of this study was: the difference in removal efficiency between the coded model and operational model for each particle size dataset was very close, with a difference value of +3.01%, indicating that the model can be used to predict the removal efficiency of a rectangular sedimentation basin. The study also revealed