This paper deals with an up to date problem for oil and gas industry- separation of the gas -fluid fogs. Here is described the worked out physical model of the gas movement process in the sections of the inertial filtering (IF) gas separators. One can find the mathematical model for research of the fields of velocities and pressures in the inertial curvilinear channel. The main simplifications and assumptions are explained. This mathematical model has been made using mathematical program Maple and it is received the 3-d graphic of the distribution componential speed parts in the channel and also 2-d graphics at the channel sectional view when the flow is flat. The new method for gas - fluid systems separation is suggested.
The aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an
... Show MoreAS Muhsen, International Journal of Psychosocial Rehabilitation (1475-7192), 2020 - Cited by 1
The researcher is one of the workers in university sports student activities, as he noticed that there is a diversity in the use of leadership patterns among managers of student activities in Iraqi universities between one director and another, which leads to the impact of these leadership styles on performance, positive or negative, in the level of human relations and the achievement of results. The researcher adopted the descriptive method in the survey method with relational relationships. The research sample consisted of (184) sports coaches who represent (27) universities and governmental and private colleges. To achieve the research objectives, the researcher used the Statistical Package for Social Sciences (Spss). To extract.statisti
... Show MoreThis research focuses on the epidemic of Job burnout and seeks to achieve sustainable preeminence among the employees of the University of Baghdad. It also identifies the meaning of the differences between the two genders of males and females according to the variables, and it also does the correlation between the two variables. First, the two researchers developed a test of job burnout that incorporates 18 items, which has been proven to be statistically fit. Moreover, they developed a competitive superiority measure consisting of 22 items in it, and its psychometric properties confirm their fit. The two tools were applied to a sample of 120 employees who were randomly selected from six colleges at the University of Baghdad, alongside univ
... Show MoreThis research studies the rheological properties ( plastic viscosity, yield point and apparent viscosity) of Non-Newtonian fluids under the effect of temperature using different chemical additives, such as (xanthan gum (xc-polymer), carboxyl methyl cellulose ( High and low viscosity ) ,polyacrylamide, polyvinyl alcohol, starch, Quebracho and Chrome Lignosulfonate). The samples were prepared by mixing 22.5g of bentonite with 350 ml of water and adding the additives in four different concentrations (3, 6, 9, 13) g by using Hamilton Beach mixer. The rheological properties of prepared samples were measured by using Fan viscometer model 8-speeds. All the samples were subjected to Bingham plastic model. The temperature range studi
... Show MoreA key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show More