The Aim of this paper is to investigate numerically the simulation of ice melting in one and two dimension using the cell-centered finite volume method. The mathematical model is based on the heat conduction equation associated with a fixed grid, latent heat source approach. The fully implicit time scheme is selected to represent the time discretization. The ice conductivity is chosen
to be the value of the approximated conductivity at the interface between adjacent ice and water control volumes. The predicted temperature distribution, percentage melt fraction, interface location and its velocity is compared with those obtained from the exact analytical solution. A good agreement is obtained when comparing the numerical results of one dimensional temperature
distribution with the analytical results.
CD-nanosponges were prepared by crosslinking B-CD with diphenylcarbonate (DPC) using ultrasound assisted technique. 5-FU was incorporated with NS by freeze drying, and the phase solubility study, complexation efficiency (CE) entrapment efficiency were performed. Also, the particle morphology was studied using SEM and AFM. The in-vitro release of 5-FU from the prepared nanosponges was carried out in 0.1N HCl.
5-FU nanosponges particle size was in the nano size. The optimum formula showed a particle size of (405.46±30) nm, with a polydispersity index (PDI) (0.328±0.002) and a negative zeta potential (-18.75±1.8). Also the drug entrapment efficiency varied with the CD: DPC molar ratio from 15.6 % to 30%. The SEM an
... Show MoreThe continuous increase in population has led to the development of underground structures like tunnels to be of great importance due to several reasons. One of these reasons is that tunnels do not affect the living activities on the surface, nor they interfere with the existing traffic network. More importantly, they have a less environmental impact than conventional highways and railways. This paper focuses on using numerical analysis of circular tunnels in terms of their behavior during construction and the deformations that may occur due to overburden and seismic loads imposed on them. In this study, the input data are taken from an existing Cairo metro case study; results were found for the lateral and vertical displacements, the Peak
... Show MoreThe seismic can be threatened the stability of the flexible body of the earth dam and can cause completely damaged or deformation on their embankment. Therefore, a geotechnical engineer needs to know the effect of earthquakes on earth structures. The change in the seismic zone that recently Iraq affected is the reason for this research, in general, in 2017, the whole of Iraq, and in particular the region, where the Al-Wand earth dam (the subject of the study) is located, was exposed to several earthquakes. This research project mainly aims to study the behavior of Al-Wand earth dam under seismic load in different conditions by simulating Al-Wand earth dam through numerical modeling an
The region-based association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease. Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls. To tackle the problem of the sparse distribution, a two-stage approach was proposed in literature: In the first stage, haplotypes are computationally inferred from genotypes, followed by a haplotype coclassification. In the second stage, the association analysis is performed on the inferred haplotype groups. If a haplotype is unevenly distributed between the case and control samples, this haplotype is labeled
... Show MoreIn this work, the finite element analysis of moving coordinates has been used to study the thermal behavior of the tissue subjected to both continuous wave and pulsed CO2 laser. The results are compared with previously published data, and a good agreement has been found, which verifies the implemented theory. Some conclusions are obtained; As pulse width decreases, or repetition rate increases, or fluence increases then the char depth is decreased which can be explained by an increase in induced energy or its rate, which increases the ablation rate, leading to a decrease in char depth. Thus: An increase in the fluence or decreasing pulse width or increasing repetition rate will increase ablation rate, which will increase the depth of cut
... Show MoreThe present work describes the development of code for trim and longitudinal stability analysis of a helicopter in forward flight. In general, particular use of these codes can be made for parametric investigation of the effects of the external and internal systems integrated to UH-60 helicopters. A forward flight longitudinal dynamic stability code is also developed in the work to solve the longitudinal part of the whole coupled matrix of equations of motion of a helicopter in forward flight. The coupling is eliminated by linearization. The trim analysis results are used as inputs to the dynamic stability code. The forward flight stability code is applied to UH-60 helicopter.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More