Heat exchanger is an important device in the industry for cooling or heating process. To increase the efficiency of heat exchanger, nanofluids are used to enhance the convective heat . transfer relative to the base fluid. - Al2O3/water nanofluid is used as cold stream in the shell and double concentric tube heat exchanger counter current to the hot stream basis oil. These nanoparticles were of particle size of 40 nm and it was mixed with a base fluid (water) at volume
concentrations of 0.002% and 0.004%. The results showed that each of Nusselt number and overall heat transfer coefficient increased as nanofluid concentrations increased. The pressure drop of nanofluid increased slightly than the base fluid because
In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i
The present work reports on the performance of three types of nanofiltration membranes in the removal of highly polluting and toxic lead (Pb2+) and cadmium (Cd2+) from single and binary salt aqueous solutions simulating real wastewaters. The effect of the operating variables (pH (5.5-6.5), types of NF membrane and initial ions concentration (10-250 ppm)) on the separation process and water flux was investigated. It was observed that the rejection efficiency increased with increasing pH of solution and decreasing the initial metal ions concentrations. While the flux decreased with increasing pH of solution and increasing initial metal ions concentrations. The maximum rejection of lead and cadmium ion
... Show MoreBackground: Different diagnostic definition and criteria have been recommended by different expert groups for the diagnosis of metabolic syndrome, however, it’s prevalence in the same population could differ depending on the definition used yielding different results. In Iraq, there is a lack of research comparing these different diagnostic definitions. Objective: To find out the most suitable metabolic syndrome definition to be used for Iraqi people. Methods: 320 participants were recruited for this study, 53.4% men and 46.6% women, aged between 25-85 years, visiting Baghdad Teaching Hospital, the prevalence of metabolic syndrome according to different definitions were compared and the agreement was assessed by the Kappa st
... Show MoreThe Purpose of this research is analysis and discussion " The Effect of Insurace Company Capital Adequacy in it’s Profitafility: An Empirical Study compared the two insurance (national, Iraqi), for a period of one year (2005) and the year (2014), as it is framed theoretical side for two topics head adequacy money the insurance company, and the profitability of the insurance company, and I've been using the research methodology and analytical, in the analysis and measurement of the capital of the insurance company adequacy, and profitability of the company, as the capital adequacy ratio was measured by dividing the total capital available on the total capital rate risk, after measured and appreciated in two insurance research, while I u
... Show MoreBackground: The Initial (primary) stability is one of the factors that play an important role in the success of the dental implants. The purpose of this study was to evaluate the initial stability of dental implant with horizontal plate by using five analytical tests: insertion torque, removal torque, resonance frequency analysis, push-in test and pull-out test. Materials and methods: Two different lengths of dental implants (5mm and 10mm) were tested in this study; each dental implant was 4mm in diameter with a square threads shape of 1mm pitch and 0.5mm depth. The crestal area was 4.2mm diameter contained a right angle margin circumferential ring while the apical area was tapered with two self-tapping grooves. In this study, the initial s
... Show MoreDrilling with casing (DWC) can be considered as a modern drilling technique in which both of drilling and casing operations done in the same time by using the casing to transfer the hydraulic and mechanical power to the bit instead of traditional drilling string. To overcome oil well control, minimizing the total cost through enhancing drilling efficiency, drilling with casing was proposed as an enabling technology.
Two surface sections (17 1/2 - and 12 1/4- inch) were drilled successfully in Rumaila oil field with casing strings which reached 655m and 1524m measured depths respectively.
By using DWC technique, the total drill/case phase time was reduced up to 20% comparing to conventional
... Show MoreResearch aims to develop a novel technique for segmental beam fabrication using plain concrete blocks and externally bonded Carbon Fiber Reinforced Polymers Laminates (CFRP) as a main flexural reinforcement. Six beams designed an experimentally tested under two-point loadings. Several parameters included in the fabrication of segmental beam studied such as; bonding length of carbon fiber reinforced polymers, the surface-to-surface condition of concrete segments, interface condition of the bonding surface, and thickness of epoxy resin layers. Test results of the segmental beams specimens compared with that gained from testing reinforced concrete beam have similar dimensions for validations. The results show the effectiven
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More