Preferred Language
Articles
/
ijcpe-811
Simulation of Two Phase Flow Mixing Co – Current in T Junction Using Comsol
...Show More Authors

The analysis, behavior of two-phase flow incompressible fluid in T-juction is done by using "A Computational Fluid Dynamic (CFD) model" that application division of different in industries. The level set method was based in “Finite Element method”. In our search the behavior of two phase flow (oil and water) was studed. The two-phase flow is taken to simulate by using comsol software 4.3. The multivariable was studying such as velocity distribution, share rate, pressure and the fraction of volume at various times.  The velocity was employed at the inlet (0.2633, 0.1316, 0.0547 and 0.0283 m/s) for water and (0.1316 m/s) for oil, over and above the pressure set at outlet as a boundary condition. It was observed through the program that the shear rate increased in the mixing area and begins to decrease after the mixing area, for the pressure suddenly decreases in the mixing area and after this area begins to decrease linearly with the length of the tube.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Solar Energy
A review of studies on using nanofluids in flat-plate solar collectors
...Show More Authors

Continuous escalation of the cost of generating energy is preceded by the fact of scary depletion of the energy reserve of the fossil fuels and pollution of the environment as developed and developing countries burn these fuels. To meet the challenge of the impending energy crisis, renewable energy has been growing rapidly in the last decade. Among the renewable energy sources, solar energy is the most extensively available energy, has the least effect on the environment, and is very efficient in terms of energy conversion. Thus, solar energy has become one of the preferred sources of renewable energy. Flat-plate solar collectors are one of the extensively-used and well-known types of solar collectors. However, the effectiveness of the coll

... Show More
Scopus (130)
Crossref (123)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering Science And Technology
Using sustainable material in improvement the geotechnical properties of soft clayey soil
...Show More Authors

Preview PDF
Scopus (42)
Scopus
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Using Earned Value Method in Project Control Applied research
...Show More Authors

   There is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.

Earned Value Method is used in the project o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 02 2010
Journal Name
Journal Of Al-nahrain University
HIDDEN FEATURES DETECTION USING HISTOGRAM MODIFICATION IN MRI IMAGES
...Show More Authors

Magnetic Resonance Imaging (MRI) uses magnetization and radio waves, rather than x-rays to make very detailed, cross- sectional pictures of the brain. In this work we are going to explain some procedures belongs contrast and brightness improvement which is very important in the improvement the image quality such as the manipulation with the image histogram. Its has been explained in this worked the histogram shrink i.e. reducing the size of the gray level gives a dim low contrast picture is produced, where, the histogram stretching of the gray level was distributed on a wide scale but there is no increase in the number of pixels in the bright region. The histogram equalization has also been discuss together with its effects of the improveme

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
1st Samarra International Conference For Pure And Applied Sciences (sicps2021): Sicps2021
Feeble Hausdorff spaces in alpha-topological spaces using graph
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Real Time Motion Detection in Surveillance Camera Using MATLAB
...Show More Authors

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion

Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
Low Fistula in Ano Treatment using Diode Laser 980nm
...Show More Authors

Anal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
International Journal Of Applied Mathematics & Statistical Sciences
Topological Structures Using Mixed Degree Systems in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.

View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF