The effect of time (or corrosion products formation) on corrosion rates of carbon steel pipe in aerated 0.1N NaCl
solution under turbulent flow conditions is investigated. Tests are conducted using electrochemical polarization
technique by determining the limiting current density of oxygen reduction in Reynolds number range of 15000 to 110000
and temperature range of 30 to 60oC. The effect of corrosion products formation on the friction factor is studied and
discussed. Corrosion process is analyzed as a mass transfer operation and the mass transfer theory is employed to
express the corrosion rate. The results are compared with many proposed models particularly those based on the
concept of analogy among momentum, heat, and mass transport. The capability of these models to predict corrosion
rates in presence of corrosion products is examined and discussed. It is found that formation of corrosion products with
time decreases the corrosion rate (or mass transfer rate) at low Reynolds number and temperature while it increases the
corrosion rate at high Re and temperature. It increases momentum transport and this increase depends on temperature,
Reynolds number, and corrosion rate. Increasing roughness due to the formation of corrosion products causes
overestimation of analogy correlations results by increasing friction factor and decreasing corrosion rate.
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreCzerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes whi
... Show MoreDuring the period October 2003 till July 2004, about (253) urine samples have been collected from urinary tract infection. The study has shown that the bacterium Proteus mirabilis is the responsible for (11.85%) of the urinary tracts infections. Also, the study has declared that the ratio of separation this bacterium from women was (7.51%) and it is higher than the ratio of separation in both men and children which ranged (1. 58%) and (2.76%) respectively . About (30) samples of stool have been collected from children and the ratio of isolation this bacterium has been showen to be( 30%) from children aged bellow 3 years,as well as, we have got bacterial cultures related to P.mirabilis isolated from the infections of middle-ear and b
... Show MoreIn this paper is to introduce the concept of hyper AT-algebras is a generalization of AT-algebras and study a hyper structure AT-algebra and investigate some of its properties. “Also, hyper AT-subalgebras and hyper AT-ideal of hyper AT-algebras are studied. We study on the fuzzy theory of hyper AT-ideal of hyper AT-algebras hyper AT-algebra”. “We study homomorphism of hyper AT-algebras which are a common generalization of AT-algebras.
In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise closure topological spaces, fibrewise wake topological spaces, fibrewise strong topological spaces over B. Also, we introduce the concepts of fibrewise w-closed (resp., w-coclosed, w-biclosed) and w-open (resp., w-coopen, w-biopen) topological spaces over B; Furthermore we state and prove several Propositions concerning with these concepts.
Abstract
A new type of solar air heater was designed, fabricated, and tested in Baghdad, Iraq winter conditions. The heater consists of two main parts. The horizontal section was filled with the black colored iron chip while the vertical part has five pipes filled with Iraqi paraffin wax. A fan was fixed at the exit of the air. Two cases were studied: when the air moved by natural convection and when forced convection moved it. The studied air heater has proven its effectiveness as it heated the air passing through it to high temperatures. The results manifest that using little air movement makes the temperatures, stored energies, and efficiencies of the two studied cases converge
... Show MoreBackground : Knee flexors tightness has been documented in apparently healthy adults and in those with musculoskeletal problems, but the influence of age on the tightness has not been studied in Iraq. This study was therefore designed to determine the influence of age on knee flexors tightness in apparently healthy subjects.Methods: Knee flexors tightness was measured using the active knee extension test (AKET) in 200 apparently healthy male and female subjects, aged 13 to 59 years. The subjects were recruited into 5 age groups using the purposive sampling technique.Knee flexors tightness was compared across the age groups using one-way analysis ofvariance (ANOVA). The independent t-test was used to compare knee flexors tightness on both
... Show MoreAfter studying the reality of application to occupational safety in new Iraqi building projects and sampling the situation wilt that in developed and neighboring countries, researcher found that there is a big gap in the level of safety application conditions, this indicates the need fora quick and clear reference for local engineers to use it on site for safety conditions in their projects . As a case study the monitors work the researcher studied a huge project in the United Arab Emirates.This project considered for safety requirements to highest grades. This case study may be far away from the projects in Iraq, but we hope to rise the Iraqi work level in the near future. After seeing the way of administration work and how they were ra
... Show MoreThroughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
In this thesis, we study the topological structure in graph theory and various related results. Chapter one, contains fundamental concept of topology and basic definitions about near open sets and give an account of uncertainty rough sets theories also, we introduce the concepts of graph theory. Chapter two, deals with main concepts concerning topological structures using mixed degree systems in graph theory, which is M-space by using the mixed degree systems. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are defined and studied. In chapter three we study supra-approximation spaces using mixed degree systems and primary object in this chapter are two topological
... Show More