This work consists of a numerical simulation to predict the velocity and temperature distributions, and an experimental work to visualize the air flow in a room model. The numerical work is based on non-isothermal, incompressible, three dimensional, k turbulence model, and solved using a computational fluid dynamic (CFD) approach, involving finite volume technique to solve continuity, momentum and energy equations, that governs the room’s turbulent flow domain. The experimental study was performed using (1/5) scaled room model of the actual dimensions of the room to simulate room air flow and visualize the flow pattern using smoke generated from burnt herbs and collected in a smoke generator to delivered through the prototype room. The numerical results were compared with those obtained from experiments, the correspondence between numerical and experimental was fairly good and also, a fair comparison was found with other workers in this field.
Software Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreA new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreThe introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show MoreA study carried out to prepare Hg1-xCdxTe compound and to see the effect on increasing the percentage of x on the compound structure by using x-ray diffraction and atomic absorption for 0
The aim of the current study is to identify the morphological description of the tongue in mongoose (Herpestes javanicus) and its relation to the feeding pattern. For this purpose the (5) samples of tongues were dissected from the head of mongoosecaught from different areas of Al-Najaf province, cleaned in normal saline and examined under the dissecting microscope. The results showed the absence of the middle groove in the lingual apex area. As well as the absence of lingual prominence in the body area. The dorsal surface is characterized by the presence of four types from lingual papillae (filiform, cylindrical, fungiform, circumvallate), while the ventral surface is free of lingual papillae. The filiform papillae spread throughout the dor
... Show MoreSeveral schottky diodes were fabricated from polyaniline/ Carbon nanotube (single and multiwalled) composites. These composites were synthesized with different concentration and two carbon nanotubes types, Single and Multi-Walled Carbon Nanotubes (SWCNT & MWCNT). Aluminum and silver paste were chosen as schottky and ohmic contact respectively. physical and electrical were used to studied these composite by using Atomic Force Microscopy (AFM) and electrical measurements. The Root Mean Square RMS surface roughness of the composite samples was found to be around 4nm. The currentvoltage characteristic were measurements for all samples in the bias range ±15V at room temperature. The results shows the increasing in carbon nanotubes concentration
... Show MoreChristianity has rituals and rituals to be carried out, and can not be abandoned, and they see that the sacred statutes ordered by Christ () his followers, including: (the mystery of baptism between Christian denominations, descriptive study) A Christian is to be baptized as the seal of faith, as evidenced by the Bible in the words of Jesus to His disciples.
Baptism takes place in the name of the Father, the Son, and the Holy Spirit. This makes them Christian through the practice of this obligatory man enters the Church, represented by the death, burial, and resurrection of Christ according to their belief. And every person who has received the sacrament of baptism remains a Christian until death, in the light of what they see.
Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and his family and companions until the Day of Judgment.
The words of God Almighty are for the sake of the greatest and greatest speech, and the scholars, may God have mercy on them, raced.
To dive into knowing the word of God and what he intended, so they wrote in it the literature and collected works in it, and explained it to those after them.
And when the noble companions, were extremely eloquent and eloquent, because the Holy Qur’an was revealed in the language of the Quraysh, and all the Arabs knew their language, they understood the Holy Qur’an and applied it p