Heat transfer applications usually contemplated day‐to‐day are primarily spotlighted on mixed convection, such as solar collector heating arrangements, electronic cooling, and drying processes. Enhancing convection heat transmission in such appliances can be achieved by inserting porous media, inflow loci, and/or line geometry. In the present paper, convection heat transmission inside a vented curved cavity () with an inserted metal foam layer ( PPI and 0.9% porosity) saturated with water was accomplished. The bottom cavity wall was discretely heated at a constant hot temperature, and the curved wall was kept at a constant cold temperature. Governing equations comprising continuity, momentum with the Darcy–Brinkmann–Forchheimer model, and local thermal equilibrium energy equation have been used and numerically resolved by utilizing the finite element scheme. The inspirations of pertinent parameters involving metal foam layer thickness (), Richardson number (, , ), Reynolds number (), inlet port position (, , ), and partial heating position (, , ) are scrutinized. The results reveal that flow and heat transfer fields are influenced chiefly by these parameter alterations. Streamlines and isotherms were affected strongly by Reynolds number and inlet port location. The average Nusselt number highly depended on the Reynolds number and the metal foam layer insertion. When and , increasing the metal foam layer thickness enlarges cavity regions with high temperature values, but when , another performance is attained. The position at is recommended in most thermal engineering applications.
In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreThe current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, name
... Show MoreThe present work aims to investigate the aerodynamic characteristics of the winglet cant angle of Boeing 737-800 wing numerically and experimentally. The wing contain two swept angles 38.3o and 29.13o respectively, taper ratio 0.15 and aspect ratio 8.04. The wing involves three types of airfoils sections. Four cant angles for blended winglet have been considered (0o, 34o, 60o, 83.3o). The winglet has been analyzed to find the best cant angle for the wing without and with winglet. These models have been tested theoretically at Reynolds number of 2.06 x106 in order to study the winglet aerodynamic characteristics which consist of coefficient of Drag, coefficient of lift and Lift to drag ratio, pitching moment coefficient and bending moment co
... Show MoreIncreasing world demand for renewable energy resources as wind energy was one of the goals behind research optimization of energy production from wind farms. Wake is one of the important phenomena in this field. This paper focuses on understanding the effect of angle of attack (α) on wake characteristics behind single horizontal axis wind turbines (HAWT). This was done by design three rotors different from each other in value of α used in the rotor design process. Values of α were (4.8˚,9.5˚,19˚). The numerical simulations were conducted using Ansys Workbench 19- Fluent code; the used turbulence model was (k-ω SST). The results showed that best value for extracted wind energy was at α=19˚, spread distance of wak
... Show MoreThis study is a numerical investigation of the performance of reinforced concrete (RC) columns after fire exposure. This study aims to investigate the effect of introducing lateral ties and using the RC jacket on improving post-fire behavior of these columns, the effect of the duration of the fire on ultimate load of columns. The analysis was performed through ABAQUS, a 3D – non-linear finite element program. 4 m tall lengthening square RC column with a cross- section of 0.4 m × 0.4 m was used as a test specimen. The RC column was reinforced by 4Ø28 mm longitudinal bars bonded by steel tie bars of Ø10 mm spaced at 400 mm. The firing temperature was increased to 60
This investigation integrates experimental and numerical approaches to study a novel solar air heater aimed at achieving an efficient design for a solar collector suitable for drying applications under the meteorological conditions of Iraq. The importance of this investigation stems from the lack of optimal exploitation of solar energy reaching the solar collector, primarily attributable to elevated thermal losses despite numerous designs employed in such solar systems. Consequently, enhancing the thermal performance of solar collectors, particularly those employed in crop drying applications, stands as a crucial focal point for researchers within this domain. Two identical double-pass solar air heaters were designed and constructed for
... Show MoreThe major cause of destruction during vertical vibration is the failure of the soil structure. The soil may fail due to loss of strength during continues vibration. The saturated sandy soil losses strength due to an increase in pore pressure, this phenomenon is called "liquefaction". Piled foundations are usually adopted as a foundation solution in potentially liquefiable soil under dynamic loading. In this research, 3D finite element model using PLAXIS Software was employed for pile foundation in saturated sandy soil. The results show the acceleration mobilization and velocity on the footing increases with increasing the intensity of dynamic loads and it becomes zero at maximum value of vertical settlement which indicates the end of the ti
... Show MoreTransport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.
A numerical study of the two-dimensional steady free convection flow in an inclined annulus between two concentric square cavities filled with a porous medium is presented in this paper for the case when the side outer walls are kept with differentially heated temperature while the horizontal outer walls and the inner walls are insulated. The heated wall is assumed to have spatial sinusoidal temperature variation about a constant mean value. The Darcy model is used and the fluid is assumed to be a standard Boussinesq fluid. For the Cartesian coordinate system, the governing equations which were used in stream function form are discretized by using the finite difference method with successive under – relaxation method (SUR) and are solv
... Show More