The analysis, behavior of two-phase flow incompressible fluid in T-juction is done by using "A Computational Fluid Dynamic (CFD) model" that application division of different in industries. The level set method was based in “Finite Element method”. In our search the behavior of two phase flow (oil and water) was studed. The two-phase flow is taken to simulate by using comsol software 4.3. The multivariable was studying such as velocity distribution, share rate, pressure and the fraction of volume at various times. The velocity was employed at the inlet (0.2633, 0.1316, 0.0547 and 0.0283 m/s) for water and (0.1316 m/s) for oil, over and above the pressure set at outlet as a boundary condition. It was observed through the program that the shear rate increased in the mixing area and begins to decrease after the mixing area, for the pressure suddenly decreases in the mixing area and after this area begins to decrease linearly with the length of the tube.
In the light of the globalization Which surrounds the business environment and whose impact has been reflected on industrial economic units the whole world has become a single market that affects its variables on all units and is affected by the economic contribution of each economic unit as much as its share. The problem of this research is that the use of Pareto analysis enables industrial economic units to diagnose the risks surrounding them , so the main objective of the research was to classify risks into both internal and external types and identify any risks that require more attention.
The research was based on the hypothesis that Pareto analysis used, risks can be identified and addressed before they occur.
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreBiodiversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity (by developmental factors) environmental factors and environmental factors environmental factors and environmental factors and environmental factors Correlation between biology and the succession of geological and historical factors of living organisms and geological and historical factors to the site and what It is surrounded by natural and tourist attractions and the pursuit of scientific methods in order to advance the studies of biological diversity in the region .
In the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.
One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.
In this paper the amplitude and the phase shift of the received signal were calculated according to the orig
... Show MoreLinear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan
... Show MoreObjective: This study goal was to screen participants from different settings in Baghdad for depression using Beck Depression Inventory (BDI) scale and identify factors influencing the levels of depression. Methods: This cross-sectional study included a convenience sample of 313 people from four settings (teaching hospital, college of medicine, college of pharmacy, and high school) in Baghdad, Iraq. The participants were screened using paper survey relying on the BDI scale during spring 2018. Using multiple linear regression analysis, we measured the association between depression scores and six participant factors. Results: The overall prevalence of depression in our sample was 57.2%. Female participants had higher BDI
... Show MoreKE Sharquie, AA Noaimi, HA Al-Mudaris, Journal of Drugs in Dermatology: JDD, 2013 - Cited by 22