The air flow pattern in a co-current pilot plant spray dryer fitted with a rotary disk atomizer was determined experimentally and modelled numerically using Computational Fluid Dynamics (CFD) (ANSYS Fluent ) software. The CFD simulation used a three dimensions system, Reynolds-Average Navier-Stokes equations (RANS), closed via the RNG k −ε turbulence model. Measurements were carried out at a rotation of the atomizer (3000 rpm) and when there is no rotation using a drying air at 25 oC and air velocity at the inlet of 5 m/s without swirl. The air flow pattern was predicted experimentally using cotton tufts and digital anemometer. The CFD simulation predicted a downward central flowing air core surrounded by a slow
... Show MoreA mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MorePurpose: The research aims to explore the impact Business Intelligence System (BIS) and Knowledge Conversion Processes (KCP) in the Building Learning Organization (LO) in KOREK Telecom Company in Baghdad city.
Design/methodology/approach: in order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then has tested the search in the telecommunications sector, representatives of one of the telecommunications companies in Baghdad city, has therefore chosen KOREK Telecom company as a sample for research, and the choice was based on the best standard international companies to serve mobile communications in terms o
... Show MoreBack ground: Diabetic nephropathy is rapidly becoming the leading cause of end-stage renal disease (ESRD). The onset and course of DN can be ameliorated to a very significant degree if intervention institutes at a point very early in the course of the development of this complication.
Objective: The aim of this study was to characterize risk factors associated with nephropathy in type I diabetes and construct a module for early prediction of diabetic nephropathy (DN) by analyzing their risk factors.
Methods: Case control design of 400 patients with type I diabetes mellitus (IDDM), aged 19-45 years. The cases were 200 diabetic patients with overt protein urea while the controls were 200 diabetic patients with no protein urea or micr
The aim of the research is to demonstrate the impact of the dimensions of the marketing vigilance represented by (environmental scanning, diagnostic capacity, validity and decision-making) and to attract deposits represented by (customer relationship management strategy, distribution strategy (location), promotion strategy), as the research was applied in each of Banks (Assyria International, Iraqi Middle East Investment, Business Bay, Iraqi Investment, Babel, Al Mansour Investment), and the questionnaire was adopted as a main tool for collecting data and information from a sample of (110) who are in the position (department manager, department manager, assistant Section Director, Division Officer, Unit Officer), and the statistical prog
... Show MoreNegotiation is considered as one of the most important kinds of communication in the contemporary organizations, which depend on the important role of managerial information systems in providing necessary and suitable information for success of the negotiation process.
Accordingly, this study aims at measuring the extent of the variables effect of managerial information system in the negotiation process.
To achieve this study, two hypotheses were chosen; the first is the correlation relation and the second is the effect, and statistical means represented by correlation coefficient "Spearman" and (R2) were used.
A Number of conclusions were
... Show MoreThis study provides valuable information on secondary microbial infections in H1N1 patients compared to Seasonal Influenza in Iraqi Patients. Nasopharynx swabs were collected from (12 ) patients infected with Seasonal influenza (11 from Baghdad and 1 Patient from south of Iraq) ,and ( 22 ) samples from patients with 2009 H1N1 ( 20 from Baghdad and 2 from south of Iraq). The results show that the patients infected with 2009 H1N1 Virus were younger than healthy subjects and those infected with seasonal influenza. And the difference reached to the level of significance (p< 0.01) compared with healthy subjects.Two cases infected with 2009 H1N1 virus (9.1%) were fro
... Show MoreA series of batch demulsification runs were carried out to evaluate the final emulsified water content of emulsion samples after the exposure to microwave. An experimental study was conducted to evaluate the effects of a set of operating variables on the demulsification performance. Several microwave irradiation demulsification runs were carried out at different irradiation powers (700, 800, and 900 watt), using water-in-oil emulsion samples containing different water contents (20-80%, 30-70%, and 50-50%) and salt contents (10000, 20000, and 30000 ppm). It was found that the best separation efficiency was obtained at 900watt, 50% water content and 160 s of irradiation time. Experimental results showed that microwave radiation method can
... Show MoreSteganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography