Preferred Language
Articles
/
ijs-6901
3D MHD Radiation Flow of Unsteady Casson Fluid with Viscous Dissipation Effect

A numerical evaluation of the crucial physical properties of a 3D unsteady MHD flow along a stretching sheet for a Casson fluid in the presence of radiation and viscous dissipation has been carried out. Meanwhile, by applying similarity transformations, the nonlinear partial differential equations (PDEs) are transformed into a system of ordinary differential equations (ODEs). Furthermore, in the numerical solution of nonlinear ODEs, the shooting method along with Adams Moulton method of order four has been used. The obtained numerical results are computed with the help of FORTRAN. The tables and graphs describe the numerical results for different physical parameters which affect the velocity and temperature profiles.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Peristaltic Flow with Nanofluid under Effects of Heat Source, and Inclined Magnetic Field in the Tapered Asymmetric Channel through a Porous Medium

     In this present paper , a special model was built to govern the equations of  two dimensional peristaltic transport to nanofluid  flow of a heat source in a tapered  considered in an asymmetric channel. The equations of dimensionless temperature concentration are analytical solve under assumption slow Reynolds number and long wave length. Furthermore, the results that receive by expressing the maximum pressure rise  communicates increased in case of  non-Newtonian fluid when equated with Newtonian fluid. Finally, MATHEMATICA  11 program has been used to solve such system after obtaining the initial conditions.  Most of the results  of drawing  for many are obtained via above program .

Scopus (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Mar 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Waterpipe Smoking Effect on Clinical Periodontal Parameters, Salivary Flow Rate and Salivary pH in Chronic ‎Periodontitis Patient

Background: Waterpipe tobacco smoking has become common especially among young people, Waterpipe smoking misconcepted as a safer mean of smoking, so in this study we will highlight the effect of Waterpipe smoking ‎on periodontal and oral health.‎ Materials and method. The selected ‎‎‎100 male subjects of 30-40 years, ‎categorized into 4 groups (each group ‎‎25 subject): Waterpipe smoker ‎with ‎healthy periodontium, ‎Waterpipe smoker ‎‎with chronic periodontitis, Non-‎‎smoker ‎with healthy periodontium and Non-smoker ‎with chronic periodontitis. Whole ‎unstimulated ‎saliva was collected. Clinical measurements: plaque ‎index

... Show More
Crossref (1)
Crossref
View Publication
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Experimental Study on Heat Transfer and Flow Characteristics in Subcooled Flow Boiling in a Microchannel

The current study presents an experimental investigation of heat transfer and flow characteristic for subcooled flow boiling of deionized water in the microchannel heat sink. The test section consisted of a single microchannel having 300μm wide nominal dimensions and 300μm height (hydraulic diameter of 300μm). The test section formed of oxygen-free copper with 72mm length and 12mm width. Experimental operation conditions spanned the heat flux (78-800) kW/m2, mass flux (1700 and 2100) kg/m2.s at 31˚C subcooled inlet temperature. The boiling heat transfer coefficient is measured and compared with existing correlations. Also, the experimental pressure drop is measured and compared with microscale p

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Tue Feb 22 2022
Journal Name
Watre
Subsurface Flow Phytoremediation Using Barley Plants for Water Recovery from Kerosene-Contaminated Water: Effect of Kerosene Concentration and Removal Kinetics

A phytoremediation experiment was carried out with kerosene as a model for total petroleum hydrocarbons. A constructed wetland of barley was exposed to kerosene pollutants at varying concentrations (1, 2, and 3% v/v) in a subsurface flow (SSF) system. After a period of 42 days of exposure, it was found that the average ability to eliminate kerosene ranged from 56.5% to 61.2%, with the highest removal obtained at a kerosene concentration of 1% v/v. The analysis of kerosene at varying initial concentrations allowed the kinetics of kerosene to be fitted with the Grau model, which was closer than that with the zero order, first order, or second order kinetic models. The experimental study showed that the barley plant designed in a subsu

... Show More
Crossref (6)
Crossref
Publication Date
Tue Feb 22 2022
Journal Name
Water
Subsurface Flow Phytoremediation Using Barley Plants for Water Recovery from Kerosene-Contaminated Water: Effect of Kerosene Concentration and Removal Kinetics

A phytoremediation experiment was carried out with kerosene as a model for total petroleum hydrocarbons. A constructed wetland of barley was exposed to kerosene pollutants at varying concentrations (1, 2, and 3% v/v) in a subsurface flow (SSF) system. After a period of 42 days of exposure, it was found that the average ability to eliminate kerosene ranged from 56.5% to 61.2%, with the highest removal obtained at a kerosene concentration of 1% v/v. The analysis of kerosene at varying initial concentrations allowed the kinetics of kerosene to be fitted with the Grau model, which was closer than that with the zero order, first order, or second order kinetic models. The experimental study showed that the barley plant designed in a subsu

... Show More
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Arpn Journal Of Engineering And Applied
Product development from 3D scanner To CNC machine in reverse engineering

The purpose of this article is to introduce reverse engineering procedure (REP). It can achieved by developing an industrial mechanical product that had no design schemes throughout the 3D-Scanners. The aim of getting a geometric CAD model from 3D scanner is to present physical model. Generally, this used in specific applications, like commercial plan and manufacturing tasks. Having a digital data as stereolithography (STL) format. Converting the point cloud be can developed as a work in programming by producing triangles between focuses, a procedure known as triangulation. Then it could be easy to manufacture parts unknown documentation and transferred the information to CNC-machines. In this work, modification was proposed and used in RE

... Show More
Scopus
Publication Date
Thu Nov 01 2012
Journal Name
Journal Of Computer Science
VOICE ACTIVATION VISUALIZATION FOR ECHOCARDIOGRAPH AND 3D ANGIOGRAPHIC IMAGES IN SURGERY

In some cases, surgeons need to navigate through the computer system for reconfirmation patients’ details and unfortunately surgeons unable to manage both computer system and operation at the same time. In this paper we propose a solution for this problem especially designed for heart surgeon, by introducing voice activation system with 3D visualization of Angiographic images, 2D visualization of Echocardiography processed video and selected patient’s details. In this study, the processing, approximation of the 3D angiography and the visualization of the 2D echocardiography video with voice recognition control are the most challenging work. The work involve with predicting 3D coronary three from 2D angiography image and also image enhan

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jan 04 2021
Journal Name
Iium Engineering Journal
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H

... Show More
Crossref (1)
Crossref
View Publication
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Geological Journal
3D Geological Model for Zubair Reservoir in Abu-Amood Oil Field

The Zubair reservoir in the Abu-Amood field is considered a shaly sand reservoir in the south of Iraq. The geological model is created for identifying the facies, distributing the petrophysical properties and estimating the volume of hydrocarbon in place. When the data processing by Interactive Petrophysics (IP) software is completed and estimated the permeability reservoir by using the hydraulic unit method then, three main steps are applied to build the geological model, begins with creating a structural, facies and property models. five zones the reservoirs were divided (three reservoir units and two cap rocks) depending on the variation of petrophysical properties (porosity and permeability) that results from IP software interpr

... Show More
Scopus (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image

The principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E

... Show More
View Publication Preview PDF