Preferred Language
Articles
/
CBZFL4cBVTCNdQwCgjx_
HEAT TRANSFER ENHANCEMENT USING PASSIVE TECHNIQUE: REVIEW
...Show More Authors

Preserving and saving energy have never been more important, thus the requirement for more effective and efficient heat exchangers has never been more important. However, in order to pave the way for the proposal of a truly efficient technique, there is a need to understand the shortcomings and strengths of various aspects of heat transfer techniques. This review aims to systematically identify these characteristics two of the most popular passive heat transfer techniques: nanofluids and helically coiled tubes. The review indicated that nanoparticles improve thermal conductivity of base fluid and that the nanoparticle size, as well as the concentrations of the nanoparticles plays a major role in the effectiveness of the nanofluids. Regarding the helically coiled tubes, it was discovered that the use of a coiled tube produces secondary flows, which ultimately improves the heat transfer enhancement. The third part of the review focused on microchannels and microtubes. This is mainly due to the growing need and requirement of smaller and more compact thermal cooling systems. Thus, ultimately the result of the review indicates that a combination of all these three techniques can lead to a compact and minimized heat exchanger that uses the benefits obtained from both nanofluids and helically coiled tubes in order to improve the heat transfer rate of the thermal systems.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 03 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
New adaptive satellite image classification technique for al Habbinya region west of Iraq
...Show More Authors

Publication Date
Mon Aug 03 2020
Journal Name
Digest Journal Of Nanomaterials And Biostructures
PREPARATION OF MIXED In2O3 – CdO THIN FILMS BY CSP TECHNIQUE FOR LIGHT SENSING
...Show More Authors

In this work, chemical spray pyrolysis deposition (CSP) technique was used to prepare a mixed In2O3-CdO thin films with different CdO content (10, 30 and 50)%volume ratio on glass substrates at 150 ᵒC substrate temperature. The surface morphology and structural properties were measured to find the optimum conditions to improve thin films properties for using as photo detector. Current –Time, the sensitivity and response speed vary for each mixture. Samples with 10% vol. CdO content has square pulse response with average rise time nearly 1s and fall time 1s.

Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
Morphological and optical properties of V2O5:TiO2 thin film prepared by PLD technique
...Show More Authors

              In this work, pure and doped Vanadium Pentoxide (V2O5) thin films with different concentration of TiO2 (0, 0.1, 0.3, 0.5) wt  were obtained using Pulse laser deposition technique on amorphous glass substrate with thickness of (250)nm. The morphological, UV-Visible and Fourier Transform Infrared Spectroscopy (FT-IR) were studied. TiO2 doping into V2O5 matrix revealed an interesting morphological change from an array of high density pure V2O5 nanorods (~140 nm) to granular structure in TiO2-doped V2O5 thin film .Transform Infrared Spectro

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Textural Properties Characterization for NaX and FeX Zeolites by Nitrogen Adsorption-desorption Technique
...Show More Authors

The zeolite's textural properties have a significant effect on zeolite's effectiveness in the different industrial processes. This research aimed to study the textual properties of the NaX and FeX zeolites using the nitrogen adsorption-desorption technique at a constant low temperature. According to the International Union of Pure and Applied Chemistry, the adsorption-desorption isotherm showed that the studied materials were mixed kinds I/II isotherms and H3 type hysteresis. The Brunauer-Emmett-Teller isotherm was the best model to describe the nitrogen adsorption-desorption better than the Langmuir and Freundlich isotherms. The obtained adsorption capacity and Brunauer-Emmett-Teller surface area values for NaX were greater than FeX. Ac

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Al–bahith Al–a'alami
Electronic media and social issues in Algeria The podcast technique is a model
...Show More Authors

This study we have made a subject of fanny podcast in electronic media, as a new way to express different issues by the public, This study focuses started on how to address social issues in Alegria by ANAS TINA vidéo on the youtube network , you are to know the trends of young amateur about the various issues dealt with as well as the most important methods used to convince browsers.
The researcher used the survey method based on studying 10 episodes videos of blogger ANAS TINA.
The result of the study found that the most important issues are the abduction of children, teaching in Algeria; women in Algeria, The negative aspects of the issues addressed have been established in order to direct public opinion and awareness of ph

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
Mask technique in the poem "Christ after the crucifixion" for Bder Shaker Al_Sayab
...Show More Authors

Research summary

Perhaps the methods of mask that Arab poets resorted to in our time are due to the conditions of oppression and political and social repression that the Arab poet suffered from; So he strived to circumvent it, and it became a justification for hiding behind it. The research is available on a number of topics that lead to the definition of the mask technique and the beginning of its prevalence in Arabic literature after the Second World War, especially in recent decades by benefiting from historical stories, fairy tales and legends of all kinds. As well as defining the mask idiomatically and linguistically, and the beginning of its use in ancient religious rituals, and the special place it had in Greek plays. Poets

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Optical And Quantum Electronics
Photocatalytic activity of anatase titanium dioxide nanostructures prepared by reactive magnetron sputtering technique
...Show More Authors

View Publication
Scopus (78)
Scopus
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Medical Journal Of Babylon
Effectiveness of Deep Breathing Technique on Pain Level of School Children during Catheterization
...Show More Authors

Scopus (3)
Scopus