Preferred Language
Articles
/
KIYXtoYBIXToZYAL0bNH
CFD analysis of phase-change material-based heat storage with dimple-shaped fins: evaluation of fin configuration and distribution pattern
...Show More Authors
Abstract<p>Phase-change materials (PCMs) have a remarkable potential for use as efficient energy storage means. However, their poor response rates during energy storage and retrieval modes require the use of heat transfer enhancers to combat these limitations. This research marks the first attempt to explore the potential of dimple-shaped fins for the enhancement of PCM thermal response in a shell-and-tube casing. Fin arrays with different dimensions and diverse distribution patterns were designed and studied to assess the effect of modifying the fin geometric parameters and distribution patterns in various spatial zones of the physical domain. The results indicate that increasing the number of dimple fins in the range of 8–32 results in faster heat storage rates by up to 8.7% faster than they would be without the dimple fins. Further improvements of approximately 1.4, 1.2, 1.1, and 1.0% can be obtained by optimizing the position of the first fin section, the spacing between other fin sections, the fin spacing based on the aromatic algorithm, and the use of the staggered fin distribution. The heat storage rate is improved by almost 12% for the best case compared with that of the no-fin case.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study of Forced- Convection from Horizontal Rectangular Fins Array into Air Duct
...Show More Authors

    In this work, an experimental study has been done to expect the heat characteristics and performance of the forced-convection from a heated horizontal rectangular fins array to air inside a rectangular cross-section duct. Three several configurations of rectangular fins array have been employed. One configuration without notches and perforations (solid) and two configurations with combination of rectangular-notches and circular-perforations for two various area removal percentages from fins namely 18% notches-9% perforations and 9% notches-18% perforations are utilized.  The rectangular fins dimensions and fins number are kept constant. The fins array is heated electrically from the base

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Change detection of remotely sensed image using NDVI subtractive and classification methods.
...Show More Authors

Change detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtrac

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Lab on-a-chip-based, an integrated microfluidic device lo-cost, rapid, and sensitive analysis of Augmentin
...Show More Authors

Microfluidic devices provide distinct benefits for developing effective drug assays and screening. The microfluidic platforms may provide a faster and less expensive alternative. Fluids are contained in devices with considerable micrometer-scale dimensions. Owing to this tight restriction, drug assay quantities are minute (milliliters to femtoliters). In this research, a microfluidic chip consisting of micro-channels carved on substrate materials built using an Acrylic (Polymethyl Methacrylate, PMMA) chip was designed using a Carbon Dioxide (CO2) laser machine. The CO2 parameters influence the chip’s width, depth, and roughness. To have a regular channel surface, and low roughness, the laser power (60 W), with scanning speed (250 m/s)

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Iraqi stock market structure analysis based on minimum spanning tree
...Show More Authors

tock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.

View Publication
Scopus Crossref
Publication Date
Sun May 08 2011
Journal Name
Journal Of Planner And Development
The use of GIS in the analysis of existing condition of spatial distribution of wire communications network in the city of Baghdad
...Show More Authors

The increasing efficiency of the telecommunications network in the city contributes to the increase in spatial interaction between activities (to influence and mutual influence) This study is based on the idea that the upgrading of telephone services provided to citizens are done exclusively through the growth and development of all levels of the service using advanced technologies to know the problems and appropriate solutions in short time and less cost. Thus, crystallized the objectives of the study which was built for the importance of GIS in the planning of services in general, and infrastructure services, in particular, including telephone services, which is represent a point of contact between individuals on the one hand a

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 10 2025
Journal Name
Journal Of Optics
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Case Studies In Thermal Engineering
The temperatures distributions of a single-disc clutches using heat partitioning and total heat generated approaches
...Show More Authors

View Publication
Scopus (36)
Crossref (34)
Scopus Clarivate Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Ingénierie Des Systèmes D Information
Performance Evaluation of Multi-Organization E-Government Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 25 2021
Journal Name
Engineering And Technology Journal
Performance evaluation of Photovoltaic Panels by a Proposed Automated System Based on Microcontrollers
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication