The present work investigates the effect of magneto – hydrodynamic (MHD) laminar natural convection flow on a vertical cylinder in presence of heat generation and radiation. The governing equations which used are Continuity, Momentum and Energy equations. These equations are transformed to dimensionless equations using Vorticity-Stream Function method and the resulting nonlinear system
of partial differential equations are then solved numerically using finite difference approximation. A thermal boundary condition of a constant wall temperature is considered. A computer program (Fortran 90) was built to calculate the rate of heat transfer in terms of local Nusselt number, total mean Nusselt number, velocity distribution as well as temperature distribution for a selection of parameters sets
consisting of dimensionless heat generation parameter (0.0 ≤ Q ≤ 2.0), conduction – radiation parameter (0.0 ≤ N ≤ 10.0), and the dimensionless magneto hydrodynamic parameter (0.0 ≤ M ≤ 1.0). Numerical solution have been considered for a fluid Prandtl number fixed at (Pr=0.7), Rayleigh number (102 ≤ ≤ 105 ) l Ra . The results are shown reasonable representation to the relation between Nusselt number and Rayleigh number with other parameters (M, N and Q). Generally, Nu increase with increasing Ra, M, N and Q separately. When the MHD, N, and Q effect added to the heat transfer mechanism, the heat transfer rate increased and this effect increased with increasing in Ra, MHD, N, and Q. The effect of magneto hydrodynamic, heat generation and heat radiation on the rate of heat transfer is concluded by correlation
equations. The results are found to be in good agreement compared with the results of other researchers.
This study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.
A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the
... Show MoreThere are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called grap
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreThis study investigated a novel application of forward osmosis (FO) for oilfield produced water treatment from the East Baghdad oilfield affiliated to the Midland Oil Company (Iraq). FO is a part of a zero liquid discharge system that consists of oil skimming, coagulation/flocculation, forward osmosis, and crystallization. Treatment of oilfield produced water requires systems that use a sustainable driving force to treat high-ionic-strength wastewater and have the ability to separate a wide range of contaminants. The laboratory-scale system was used to evaluate the performance of a cellulose triacetate hollow fiber CTA-HF membrane for the FO process. In this work, sodium chloride solution was used as a feed solution (FS) with a concentratio
... Show MoreThe Local and Global Corporations are suffering of managerial and financial corruption phenomena, which leads them to loss and bankruptcy. So, it is necessary to search for tools which help prevent phenomena like this, and one of these tools is (corporate governance) which represent controlling tool that contribute in reducing corruption. this study aims at modifying (corporate governance system)in order to make it suitable with Iraqi government Corporations. the study depend upon main hypothesis which is (the performance level of the strategic perspective of governance system is depending upon work according to the perspective dimensions itself. From the main conclusions:-It is possible to building a strategic perspective
... Show MoreThe study showed that all extracts (aqueous, ethanolic and acetonic) of the leaves of Eucalyptus and Myrtus plants had a inhibitory effect on the growth of all types of yeasts studied, acetone extract recorded the highest inhibition of yeastat 100ppm concentration,The inhibition was 35mm, 34mm, 24mm and 20mm for Candida parapsilosis, Candida glabrata, Candida tropicalis and Candida albicans respectively, The experiments above showed the least significant differences at 0.05 level.The results ofE. Cammldulensis ethanolic tincture analysis has shown the presence of 44 biologically active substances. The main Eucalyptus leaves component was: 2-Bicyclo (2-2.1) heptanol (12.37%), Ledol (8.23%),1,2,4- Benzenetriol (8.45%) and that contain spathul
... Show More