The behaviour of certain dynamical nonlinear systems are described in term as chaos, i.e., systems' variables change with the time, displaying very sensitivity to initial conditions of chaotic dynamics. In this paper, we study archetype systems of ordinary differential equations in two-dimensional phase spaces of the Rössler model. A system displays continuous time chaos and is explained by three coupled nonlinear differential equations. We study its characteristics and determine the control parameters that lead to different behavior of the system output, periodic, quasi-periodic and chaos. The time series, attractor, Fast Fourier Transformation and bifurcation diagram for different values have been described.
Fluidization process is widely used by a great assortment of industries worldwide and represents a trillion dollar industry [6]. They are currently used in separation, classification, drying and mixing of particles, chemical reactions and regeneration processes; one of these processes is the mass transfer from an immersed surface to a gas fluidized bed
The aim of this study is to know the effect of using locally manufactured fishmeal and its nutritional value note that its manufactured from uneconomical local fish are not for human consumption. Cyprinus carpio fed with three different diets levels of locally manufactured fishmeal at a rate of 0.03 and 0.05 of the body weight. For control treatment (C1), the second treatment (C2) and the third treatment (C3). It was found that the C3 was superior to the first two parameters, control (C1) and (C2), in most of the studied standards with a high significance level (P≥0.05). The average final weight of the fish in the third parameter (C3) was 7.75g. The daily growth rate (DGR) of the th
The main objective of resources management is to supply and support the site operation with necessary resources in a way to achieve the required timing in handing over the work as well as to achieve the cost-realism within the budget estimated. The research aims to know the advantage of using GIS in management of resources as one of the new tools that keep pace with the evolution in various countries around the world also collect the vast amount of spatial data resources in one environment easily to handled and accessed quickly and this help to make the right decision regarding management of resources in various construction projects. The process of using GIS in the management and identification of resources is of extreme importance in t
... Show MoreGas lift is one of the artificial lift techniques which it is frequently implemented to raise oil production. Conventionally, the oil wells produce depending on the energy of reservoir pressure and solution gas which declines due to continuous production. Therefore, many oil wells after a certain production time become unable to lift oil to the surface. Thus, the continuity of production requires implementation of gas lift which works to decrease the average fluid density in the tubing by injection gas through the annulus into the tubing. This paper aims to get maximum oil production of an Iraqi giant oil field at optimum injected gas rate. The field is located in south of Iraq and in
Mass transfer has been studied at rotating cylinder electrodes fabricated with spiral-wound woven-wire meshes using reduction of copper as a test reaction. The experimental data were correlated by an empirical expression between the Sherwood number and the Reynolds number, both regarding the hydraulic diameter as a characteristic length. It was found that the Sherwood number was dependent upon the Reynolds number to the power of 0.521. An enhancement factor was adopted to compare the efficiency of the new rotating cylinder electrode with previous three-dimensional rotating cylinder electrodes. The results showed that the new type has a mass-transfer enhancement factor 2.3 times higher than those obtained with smooth rotating cylinder electr
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More