Three cohesionless free flowing materials of different density were mixed in an air fluidized bed to study the mixing process by calculating performance of mixing index according to Rose equation (1959) and to study the effect of four variables (air velocity, mixing time, particle size of trace component and concentration of trace component) on the mixing index and as well as on mixing performance. It was found that mixing index increases with increasing the air velocity, mixing time and concentration of trace component until the optimum value. Mixing index depends on the magnitude of difference in particle size The first set of experiments (salt then sand then cast iron) give higher mixing index and better performance of mixing than the second set of experiments (sand then salt then cast iron). Box-Willson method was used to minimize number of experiments and to represent the relationship between the variables.
Commercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreAbstract
The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of
Background: intravenous regional anaesthesia (IVRA) is an effective method of producing anaesthesia of the extremities. Disadvantages are the rapid loss of anaesthesia after the deflation of the tourniquet and the rapid development of postoperative pain. It is important to search for agents with longer durations of action, better nerve fibre selectivity, lesser degrees of motor blockade and lower incidences of systemic toxicity.Objectives: This study was designed to evaluate and compare the clinical effects of intravenous regional anaesthesia, with lidocaine alone, or in a combination with ketamine and atracurium for better analgesia, and to examine the possible clinical advantages of using muscle relaxants (i.e., atracurium) with intrav
... Show MoreThe current study aims to examine the experience of female students with disabilities who studying in university in kingdom of Saudi Arabia. To this end, the researcher used semi-structured interview as an instrument to collect the study data which regards as one of the descriptive approach tools. The sample comprised (12) disabled-female students from multidiscipline within both college of arts and college of education. To analyze the collected data, the author utilized a thematic analysis method following six steps as stated by (Braun and Clark, 2006). The findings revealed that disabled students have a high self-confidence which push them forward to take part in activities that hold on campus. Besides, significant variation were shown
... Show MoreThe purpose of this study is to measure the levels of quality control for some crude oil products in Iraqi refineries, and how they are close to the international standards, through the application of statistical methods in quality control of oil products in Iraqi refineries. Where the answers of the study sample were applied to a group of Iraqi refinery employees (Al-Dora refinery, Al-Nasiriyah refinery, and Al-Basra refinery) on the principles of quality management control, and according to the different personal characteristics (gender, age, academic qualification, number of years of experience, job level). In order to achieve the objectives of the study, a questionnaire that included (12) items, in order to collect preliminary inform
... Show MoreAbstract:
One of the important things provided by fuzzy model is to identify the membership functions. In the fuzzy reliability applications with failure functions of the kind who cares that deals with positive variables .There are many types of membership functions studied by many researchers, including triangular membership function, trapezoidal membership function and bell-shaped membership function. In I research we used beta function. Based on this paper study classical method to obtain estimation fuzzy reliability function for both series and parallel systems.
The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.