The analysis, behavior of two-phase flow incompressible fluid in T-juction is done by using "A Computational Fluid Dynamic (CFD) model" that application division of different in industries. The level set method was based in “Finite Element method”. In our search the behavior of two phase flow (oil and water) was studed. The two-phase flow is taken to simulate by using comsol software 4.3. The multivariable was studying such as velocity distribution, share rate, pressure and the fraction of volume at various times. The velocity was employed at the inlet (0.2633, 0.1316, 0.0547 and 0.0283 m/s) for water and (0.1316 m/s) for oil, over and above the pressure set at outlet as a boundary condition. It was observed through the program that the shear rate increased in the mixing area and begins to decrease after the mixing area, for the pressure suddenly decreases in the mixing area and after this area begins to decrease linearly with the length of the tube.
Cosmochthonius reticulatus Grandjean, 1947 (Acari: Oribatei: Cosmochthoniidae) and Rhysotritia ardua ardua C. L. Koch, 1841 ( Acari : Oribate : Euphthiracari¬dae), are two species of oribatids mites first recorded in Iraq from a woodland in the central part of Iraq. The two species are described and illustrated.
The AlAdhaim Dam is located 133 kilometers northeast of Baghdad. It is a multipurpose dam and joints the Iraqi dam system in 2000. It has a storage capacity of 1.5 billion m3. The dam has an ogee spillway with a length of 562 m, a crest level of 131.5 m.a.m.s.l. and a maximum discharge capacity of 1150 m3/s at its maximum storage height of 143 m.a.m.s.l. This research aimed to investigate the hydrodynamics performance of the spillway and the stilling basin of AlAdhiam Dam by using numerical simulation models under gated situations. It was suggested to modify the dam capacity by increasing the dam's storage capacity by installing gates on the crest of the dam spillway. The FLUENT program was used to
... Show MoreIn this study, the response of ten composite post-tensioned concrete beams topped by a reinforced concrete deck with adequate reinforcing shear connectors is investigated. Depending on the concrete compressive strength of the deck slab (20, 30, and 40 MPa), beams are grouped into three categories. Seven of these beams are exposed to a fire attack of 700 and 800 °C temperature simultaneously with or without the presence of a uniformly distributed sustained static loading. After cooling back to ambient temperature, these composite beams are loaded up to failure, using a force control module, by monotonic static loading in a four-point-bending setup with two symmetrical concentrated loads applied in
In this study, the response of ten composite post-tensioned concrete beams topped by a reinforced concrete deck with adequate reinforcing shear connectors is investigated. Depending on the concrete compressive strength of the deck slab (20, 30, and 40 MPa), beams are grouped into three categories. Seven of these beams are exposed to a fire attack of 700 and 800 °C temperature simultaneously with or without the presence of a uniformly distributed sustained static loading. After cooling back to ambient temperature, these composite beams are loaded up to failure, using a force control module, by monotonic static loading in a four-point-bending setup with two symmetrical concentrated loads applied in
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreGlobally, over forty million people are living with Human Immunodeficiency Viral (HIV) infections. Highly Active Antiretroviral Therapy (HAART) consists of two or three Antiretroviral (ARV) drugs and has been used for more than a decade to prolong the life of AIDS-diagnosed patients. The persistent use of HAART is essential for effectively suppressing HIV replication. Frequent use of multiple medications at relatively high dosages is a major reason for patient noncompliance and an obstacle to achieving efficient pharmacological treatment. Despite strict compliance with the HAART regimen, the eradication of HIV from the host remains unattainable. Anatomical and Intracellular viral reservo
Abstract: The aim of this study is to monitor the variation of physical property and chemical composition of vaginal fluid in the cow. The constituents of estrous vaginal fluid sample, its consistency color and electrolyte composition to be diagnose during estrous. The sample in this research was 22 dairy cows. The research methodology involves the procedure, which is used in making decisions and clarifying the course of action, and the underlying assumptions through taking samples and examining the fluid and assessed nature for each samples. A 5 ml Samples of vaginal fluids preparation for the determination of some elements after taking samples, description of its conditions, extraction and examination the fluid was described usi
... Show MoreIn this ˑwork, we present theˑ notion of the ˑgraph for a KU-semigroup as theˑundirected simple graphˑ with the vertices are the elementsˑ of and weˑˑstudy the ˑgraph ofˑ equivalence classesˑofˑ which is determinedˑ by theˑ definition equivalenceˑ relation ofˑ these verticesˑ, andˑ then some related ˑproperties areˑ given. Several examples are presented and some theorems are proved. Byˑ usingˑ the definitionˑ ofˑ isomorphicˑ graph, ˑwe showˑ thatˑ the graphˑ of equivalence ˑclasses ˑand the ˑgraphˑof ˑa KU-semigroup ˑ areˑ theˑ sameˑ, in special cases.