Accurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equilibrium data point with very good accuracy. The developments of this method are applied on 13 binary systems at different temperatures which gives very good accuracy.
Background: 18F-FDG positron emission tomography (PET) has established itself in the field of oncology and it is useful in the initial staging and follow-up of a variety of malignancies. Significant thyroid uptake is often identified as an accidental finding on whole-body positron emission tomography for non-thyroid disease.
Aim of this study: to investigate the effect of 18F-FDG on thyroid gland function after performing PET scan compared to thyroid function prior to scan.
Materials and Methods: 43 subjects who had an 18F-FDG PET scan as part of a cancer screening program participated in this study. All cancers are diagnosed using 18F-FDG, except for prostate cancer,
... Show More The most likely fusion reaction to be practical is Deuterium and Helium-3 (ð·âˆ’ð»ð‘’
3 ), which is highly desirable because both Helium -3 and Deuterium are stable and the reaction produces a 14 ð‘€ð‘’𑉠proton instead of a neutron and the proton can be shielded by magnetic fields. The strongly dependency of the basically hot plasma parameters such as reactivity, reaction rate, and energy for the emitted protons, upon the total cross section, make the problems for choosing the desirable formula for the cross section, the main goal for our present work.
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreFace Detection by skin color in the field of computer vision is a difficult challenge. Detection of human skin focuses on the identification of pixels and skin-colored areas of a given picture. Since skin colors are invariant in orientation and size and rapid to process, they are used in the identification of human skin. In addition features like ethnicity, sensor, optics and lighting conditions that are different are sensitive factors for the relationship between surface colors and lighting (an issue that is strongly related to color stability). This paper presents a new technique for face detection based on human skin. Three methods of Probability Density Function (PDF) were applied to detect the face by skin color; these ar
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreHigh peak to average power ration (PAPR) in orthogonal frequency division multiplexing (OFDM) is an important problem, which increase the cost and complexity of high power amplifiers. One of the techniques used to reduce the PAPR in OFDM system is the tone reservation method (TR). In our work we propose a modified tone reservation method to decrease the PAPR with low complexity compared with the conventional TR method by process the high and low amplitudes at the same time. An image of size 128×128 is used as a source of data that transmitted using OFDM system. The proposed method decrease the PAPR by 2dB compared with conventional method with keeping the performance unchanged. The performance of the proposed method is tested with
... Show MoreJohn Updike’s use of setting in his fiction has elicited different and even conflicting reactions from critics, varying from symbolic interpretations of setting to a sense of confusion at his use of time and place in his stories. The present study is an attempt at examining John Updike’s treatment of binary settings in Pigeon Feathers and Other Stories (1962) to reveal theme, characters’ motives and conflicts. Analyzing Updike’s stories from a structuralist’s perspective reveals his employment of two different places and times in the individual stories as a means of reflecting the psychological state of the characters, as in “The Persistence of Desire”, or expressing conflicting views on social and political is
... Show MoreDecision-making in Operations Research is the main point in various studies in our real-life applications. However, these different studies focus on this topic. One drawback some of their studies are restricted and have not addressed the nature of values in terms of imprecise data (ID). This paper thus deals with two contributions. First, decreasing the total costs by classifying subsets of costs. Second, improving the optimality solution by the Hungarian assignment approach. This newly proposed method is called fuzzy sub-Triangular form (FS-TF) under ID. The results obtained are exquisite as compared with previous methods including, robust ranking technique, arithmetic operations, magnitude ranking method and centroid ranking method. This
... Show MoreThree types of metal carboxylates (Ho,Tb and Dy) stearates were LLSed as thennal stabi lizers for PVC. Infrared spectra (1500-1900
|
cm.1
were studied for PVC films stabilized with these metal
carboxylatcs. Two types of oxygen were round -containing products that were formed during the thermal degradation .On the other hand , the presence &nb
... Show MoreThis work represents study the rock facies and flow unit classification for the Mishrif carbonate reservoir in Buzurgan oil Field, which located n the south eastern Iraq, using wire line logs, core samples and petrophysical data (log porosity and core permeability). Hydraulic flow units were identified using flow zone indicator approach and assessed within each rock type to reach better understanding of the controlling role of pore types and geometry in reservoir quality variations. Additionally, distribution of sedimentary facies and Rock Fabric Number along with porosity and permeability was analyzed in three wells (BU-1, BU-2, and BU-3). The interactive Petrophysics - IP software is used to assess the rock fabric number, flow zon
... Show More