A pseudo-slug flow is a type of intermittent flow characterized by short, frothy, chaotic slugs that have a structure velocity lower than the mixture velocity and are not fully formed. It is essential to accurately estimate the transition from conventional slug (SL) flow to pseudo-slug (PSL) flow, and from SL to churn (CH), by precisely predicting the pressure losses. Recent research has showed that PSL and CH flows comprise a significant portion of the conventional flow pattern maps. This is particularly true in wellbores and pipelines with highly deviated large-diameter gas-condensate wellbores and pipelines. Several theoretical and experimental works studied the behavior of PSL and CH flows; however, few models have been suggested to pre
... Show MoreMunicipal wastewater sources are becoming increasingly important for reuse, for irrigation purposes, so they must be treated to meet environmentally friendly local or global standards. The aim of this study is to establish, calibrate, and validate a model for predicting chemical oxygen demand for the pilot plant of mobile biofilm reactors operating from municipal wastewater in Maaymyrh located in Hilla city Using the approach of dimensional analysis. The approach of Buckingham's theorem was used to derive a model of dimensional analysis design for the forecast of (COD) in the pilot plant. The effluent concentration (COD) It has been derived as a result of the influential concentration of (COD), dissolved oxygen (DO), volume of pilot plant
... Show MoreNowadays, the robotic arm is fast becoming the most popular robotic form used in the industry among others. Therefore, the issues regarding remote monitoring and controlling system are very important, which measures different environmental parameters at a distance away from the room and sets various condition for a desired environment through a wireless communication system operated from a central room. Thus, it is crucial to create a programming system which can control the movement of each part of the industrial robot in order to ensure it functions properly. EDARM ED-7100 is one of the simplest models of the robotic arm, which has a manual controller to control the movement of the robotic arm. In order to improve this control s
... Show MoreThe railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this st
... Show MoreImage of landsate-7 taken by thematic mapper was used and classified using supervised method. Results of supervised classification indicated presence of nine land cover classes. Salt-soils class shows the highest reflectance value while water bodies' class shows the lowest values. Also the results indicated that soil properties show different effects on reflectance. There was a high significant positive relation of carbonate, gypsum, electric conductivity and silt content, while there was a week positive relation with sand and negative relation with organic matter, water content, bulk density and cataion exchange capacity.
Image of landsate-7 taken by thematic mapper was used and classified using supervised method. Results of supervised classification indicated presence of nine land cover classes. Salt-soils class shows the highest reflectance value while water bodies' class shows the lowest values. Also the results indicated that soil properties show different effects on reflectance. There was a high significant positive relation of carbonate, gypsum, electric conductivity and silt content, while there was a week positive relation with sand and negative relation with organic matter, water content, bulk density and cataion exchange capacity.
This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreDue to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application
... Show More