The aim of this work is to develop an axi-symmetric two dimensional model based on a coupled simplified computational fluid dynamics (CFD) and Lagrangian method to predict the air flow patterns and drying of particles. Then using this predictive tool to design more efficient spray dryers. The approach to this is to model what particles experience in the drying chamber with respect to air temperature and humidity. These histories can be obtained by combining the particles trajectories with the air temperature/humidity pattern in the spray dryer. Results are presented and discussed in terms of the air velocity, temperature, and humidity profiles within the chambers and compared for drying of a 42.5% solids solution in a spray chamber 2.22m in diameter with a cylindrical top section 2.00m high and a bottom cone section 1.725m high.
In this research tri metal oxides were fabricated by simple chemical spray pyrolysis technique from (Sn(NO3)2.20 H2O, Zn(NO3)2.6 H2O, Cd(NO3)2.4 H2O) salts at concentration 0.1M with mixing weight ratio 50:50 were fabricated on silicon substrate n-type (111). (with & without the presence of grooves by the following diemensions (20μm width, 7.5μm depth) with thickness was about ( 0.1 ±0.05 µm) using water soluble as precursors at a substrate temperature 550 ºC±5, with spray distance (15 cm) and their gas sensing properties toward H2S gas at different concentrations (10,50,100,500 ppmv) in air were investigated at room te
... Show MoreIn this research Bi2S3 thin films have been prepared on glass substrates using chemical spray pyrolysis method at substrate temperature (300oC) and molarity (0.015) mol. Structural and optical properties of the thin films above have been studied; XRD analysis demonstrated that the Bi2S3 films are polycrystalline with (031) orientation and with Orthorhombic structure. The optical properties were studied using the spectral of the absorbance and transmission of films in wavelength ranging (300-1100) nm. The study showed that the films have high transmission within the range of the visible spectrum. Also absorption coefficient, extinction coefficient and the optical energy gap (Eg) was calculated, found that the film have direct ener
... Show MoreThe design of reinforced concrete spread foundations mainly depends on soil bearing capacity, loading value, and column size. So for each design case, tiresome calculations and time consumption are needed. In this paper, generalized design charts are presented and plotted according to derivations based on the ACI 318 M-2019 Code. These charts could be used directly by the structural designers to estimate the column size, foundation thickness, and dimensions as well as the foundation reinforcement under a certain given concentric load assuming a uniformly distributed contact pressure underneath the foundation. Of noteworthy, these charts are oriented to deal with square isolated footings with a square concentric column, covering reasonable r
... Show MoreThis study was aimed to reduce the amount of the sprayed solution lost during trees spraying. At the same time, the concentration of the sprayed solution on the target (tree or bush) must be ensured and to find the best combination of treatments. Two factors controls the spraying process: (i) spraying speed (1.2 km/h, 2.4 km/h, 3.6 km/h), and (ii) the type of sensor. The test results showed a significant loss reduction percentage. It reached (6.05%, 5.39% and 2.05%) at the speed (1.2 km/h, 2.4 km/h, 3.6 km/h), respectively. It was noticed that when the speed becomes higher the loss becomes less accordingly. The interaction between the 3.6 km/h speed and the type of Ultrasonic sensor led to a decrease in the percentage of the spray
... Show MoreThe current research aims to evaluate the activities and evaluation questions implied in the content of the computer textbook for the fifth preparatory grade according to the creative thinking and developing suggestions through answering the following question: what is the percentage of creative thinking skills in the content of the computer textbook for the fifth Preparatory grade students issued by the Iraqi Ministry of Education/ Directorate General of the curriculum in the academic year (2019-2020)? The researchers followed the descriptive-analytical approach. The research community was determined by the content of the computer textbook for the fifth preparatory grade. As for the research sample, it was limited to all activitie
... Show MoreProsthetic hands are compensatory devices for the hand amputees as a result of injury, various accidents or birth deformities, types of prosthetic hand vary depending on the mechanism they operate and how they perform. There are common types in use that are characterized by their complex mechanisms, which are difficult for the amputee to use or exclude use because of their high cost, therefore the aim of this research is to design an artificial hand that is suitable in terms of simplicity of use and low cost and similar to a natural hand with regard to dimensions and shape that operated in the mechanism of links. This research involves Stress and strain analysis of the prosthetic hand and its fingers that modelled from (Petg CR)
... Show MoreComputer modeling has been used to investing the Coulomb coupling parameter ?. The effects of the structure parameter K, grain charge Z, plasma density N, temperature dust grain Td, on the Coulomb coupling parameter had been studied. It was seen that the ? was increasing with increasing Z and N, and decrease with increasing K and T. Also the critical value of ? that the phase transfer of the plasma state from liquid to solid was studied.
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThe origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application.
... Show More
