The analysis, behavior of two-phase flow incompressible fluid in T-juction is done by using "A Computational Fluid Dynamic (CFD) model" that application division of different in industries. The level set method was based in “Finite Element method”. In our search the behavior of two phase flow (oil and water) was studed. The two-phase flow is taken to simulate by using comsol software 4.3. The multivariable was studying such as velocity distribution, share rate, pressure and the fraction of volume at various times. The velocity was employed at the inlet (0.2633, 0.1316, 0.0547 and 0.0283 m/s) for water and (0.1316 m/s) for oil, over and above the pressure set at outlet as a boundary condition. It was observed through the program that the shear rate increased in the mixing area and begins to decrease after the mixing area, for the pressure suddenly decreases in the mixing area and after this area begins to decrease linearly with the length of the tube.
The research deal with three variables of exceptional importance to organization business firms. These variables are emotional intelligence, transformational leadership, and organizational performance. The aim of this research is to determine the effect of emotional intelligence and transformational leadership on organizational performance at the banking sector, which is represented by Al-Rafidain Bank. The problem of the research is expressed by many questions related with the nature of the interrelationships and effects among research’s variables. The researcher has depended upon the descriptions - analytical approach. on a random sample of (80 ) managers
... Show MoreThis research deals with the detection of possible surface soil pollution by radon emissions for an area located inside the university of Baghdad campus at AL-Jadiriyah / Baghdad. The area is about 5625 m2 and located near the College of Science for Women. The area used as construction rubbles dump yard in the past, while recently it is covered with Silty - Clayey soil furnished with grass and used as a playground. A surface survey performed on October 2018 by gridding the area into 36 stations where surface radiometric pollution readings recorded and soil samples collected by using an auger for the top 30 Cm which represents the root zone of the area. Soil samples tested in the laboratory by using can technique with CR-
... Show MoreIn this work, thiadiazole derivatives were prepared by taking advantage of active sites in (2-amino-5-mercapto-1, 3, 4-thiadiazole) as a starting material base. The main heterocyclic compounds (1, 3, 4-thiadiazole, oxazole) etc, 2-amino-5-mercapto-1,3,4-thiadiazole compound (1) was prepared by cyclic closure of thiosemicarbazide compound with anhydrous sodium carbonate and carbon disulfide. Oxidation of (1) via hydrogen peroxide, to have (2) which was treated with chloro acetyl chloride to get (3). Preparation of thiazole ring (4) was from reacting of (3) with thiourea. Synthesis of diazonium salts (5) from compound (4) using sodium nitrite and HCl. Compound (5) reacted with different ester compounds to prepare a new azo compounds (6–8).C
... Show MoreA series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe new compounds of pyrazolines were synthesized from the reaction of different acid hydrazide with ethylacetoacetate and ethanol under reflux. These compounds were obtained from many sequence reactions. The 4-acetyl-5-methyl-2,4-dihydro-3H-pyrazol-3-one compounds synthesized from the reaction of 5-methyl-2,4-dihydro-3H-pyrazol-3-one with acetyl chloride in calcium hydroxide and 1,4-dioxane. Finaly, Schiff bases were prepared via condensation reaction of products of mono- and tri ketone derivatives[IV]a, b with phenyl hydrazines as presented in (Scheme 1, 2). The synthesized compounds were identification by using FTIR, NMR and Mass spectroscopy (of some of them).