In this work, the mathematical modelling of peristaltic transport for incompressible Sutterby fluid through the cavity between coaxial tubes where the inner tube is fixed and the outer tube has sinusoidal rhythmic fluctuations along the channel’s walls is presented. Under the assumption of long wavelength and the low Reynolds number, the governing equations (motion, temperature, and concentration) are illustrated in cylindrical coordinates. The analytical solution for the temperature and concentration of the fluid flow is obtained using Mathematica 11.3, whereas the perturbation technique is employed to find the closed form of the velocity profile. The variation of the axial velocity, stream function, temperature, concentration, and heat transfer are graphically discussed under the impact of interesting involved parameters.
It is well known that drilling fluid is a key parameter for optimizing drilling operations, cleaning the hole, and managing the rig hydraulics and margins of surge and swab pressures. Although the experimental works represent valid and reliable results, they are expensive and time consuming. In contrast, continuous and regular determination of the rheological fluid properties can perform its essential functions during good construction. The aim of this study is to develop empirical models to estimate the drilling mud rheological properties of water-based fluids with less need for lab measurements. This study provides two predictive techniques, multiple regression analysis and artificial neural networks, to determine the rheological
... Show MoreBackground: Ultrasound is a valuable tool for evaluating fetal problems throughout pregnancy. Amniotic fluid anomalies have been associated with unfavorable maternal, fetal, and obstetrical outcomes. Objective: To determine the effect of echogenic amniotic fluid during term pregnancy on the presence of meconium stain liquor and pregnancy outcome. Methods: A cross-sectional study was conducted on 1080 term pregnant women who visited Al-Elwiya Maternity Teaching Hospital from May 1st, 2021, to May 1st, 2023. Ultrasound was used to analyze echogenic amniotic fluid and turbid liquor. The liquor state was tested either after an artificial membrane rupture in the vaginal delivery trial or during a cesarean section. Results: Echogenic amni
... Show MoreAbstract
Documentary credits are considered successful means to reduce imports, especially unnecessary imports that lead to the outflow of foreign currency from the country. However, due to the backwardness of the banking methods, the reintroduction of documentary credits after 2003 did not effectively contribute to reducing import rates. This has had a negative impact on the Iraqi economy and made it vulnerable to external markets. Documentary credits are also considered the best way to ensure payment in international trade, providing independent credit support and sufficient security for exporters and importers against commerci
... Show MoreThis paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groy
... Show MoreProviding useful information in estimating the amount and timing and the degree of uncertainty concerning the future cash flows is one of the three main objectives of the financial reporting system, which is done through the main financial statements. The interest on standard-setting bodies in the forecasting of future cash flows, especially Financial Accounting Standards Board (FASB) explain under Accounting Standard (1) of the year 1978 "Objectives of Financial Reporting by Business Enterprises", paragraph (37) thereof that accounting profits better than cash flows when forecasting future cash flows, In contrast, IAS (7) as amended in 1992 aims to compel economic units to prepare statement of c
... Show MoreThis paper studies the combination of fluid viscous dampers in the outrigger system to add supplementary damping into the structure, which purpose to remove the dependability of the structure to lower variable intrinsic damping. This optimizes the accuracy of the dynamic response and by providing higher level of damping, basically minimizes the wanted stiffness of the structure while at the same time optimizing the achievement.
The modal considered is a 36 storey square high rise reinforced concrete building. By constructing a discrete lumped mass model and using frequency-based response function, two systems of dampers, parallel and series systems are studied. The maximu
... Show MoreThe research aims to Applied Study in the nature of the impact of information asymmetry for brokerage firms in the common stock trading, The research included the theoretical concepts associated with each of the brokerage firms ,information asymmetry and common stock trading, It used the financial methods on the practical side of the information asymmetry for brokerage firms based in the sector as well as trading volume and spread for common stock , The community of the research included the Iraq Stock Exchange,the sample of research the companies listed which have been trading on its stock for the period August 2015 until December 2015 as well as brokerage firms
amounting to 47 brokerage firm. The resea
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show More