Inherent fluctuations in the availability of energy from renewables, particularly solar, remain a substantial impediment to their widespread deployment worldwide. Employing phase-change materials (PCMs) as media, saving energy for later consumption, offers a promising solution for overcoming the problem. However, the heat conductivities of most PCMs are limited, which severely limits the energy storage potential of these materials. This study suggests employing circular fins with staggered distribution to achieve improved thermal response rates of PCM in a vertical triple-tube heat exchanger involving two opposite flow streams of the heat-transfer fluid (HTF). Since heat diffusion is not the same at various portions of the PCM unit, different fin configurations, fin dimensions and HTF flow boundary conditions were explored using computational studies of melting in the PCM triple-tube system. Staggered configuration of fin distribution resulted in significant increases in the rates of PCM melting. The results indicate that the melting rate and heat charging rate could be increased by 37.2 and 59.1%, respectively, in the case of staggered distribution. Furthermore, the use of lengthy fins with smaller thickness in the vertical direction of the storage unit resulted in a better positive role of natural convection; thus, faster melting rates were achieved. With fin dimensions of 0.666 mm × 15 mm, the melting rate was found to be increased by 23.6%, when compared to the base case of 2 mm × 5 mm. Finally, it was confirmed that the values of the Reynolds number and inlet temperatures of the HTF had a significant impact on melting time savings when circular fins of staggered distribution were included.
KE Sharquie, AA Noaimi, ZT Burhan, Journal of Cosmetics, Dermatological Sciences and Applications, 2016 - Cited by 9
Background: The aim of this study was to evaluate the expression of fibroblast growth factor-2 and Heparanase in salivary pleomorphic adenoma, and to correlate the two studied markers with each other and with clinicopathological parameters including: age, sex, tumor site and histopathological presentation. Methods: Sections of twenty five formalin-fixed paraffin embedded tissue blocks specimens of salivary pleomorphic adenoma were immunostained using monoclonal antibodies (Fibroblast growth factor-2 and Heparanase) to assess their expression in this tumor. Results: The expression of fibroblast growth factor-2 and Heparanase were positive in all pleomorphic adenoma cases (100%). The positive expression of fibroblast growth factor-2 was signi
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreEffect of Using Computer in Getting and Remaining Information at Students of First Stage in Biology Subject MIAAD NATHIM RASHEED LECTURER Abstract The recent research goal is to know the influence of computer use to earn and fulfillment information for students of first class in biology material and to achieve that put many of the zeroing hypothesis by researcher as follow: There were no differences between statistical signs at level (0,05) between the average students' marks who they were study by using computer and between the average student ' marks who they were study in classical method of earning and fulfillment. The researcher chose the intentional of the medical technical institute that included of two branches the first class (A
... Show MoreA novel azo dye was prepared by reacting the diazonium salt of 3-aminophenol with 8-hydroxyquinoline and subsequently used to prepare a series of Ni+2, Pd+2, Pt+4, and Cu+2 complexes. The ligand structure was characterized via1H-and 13C-nuclear magnetic resonance spectroscopy. The as-synthesized materials were characterized via Fourier-transform infrared, ultraviolet‒visible, and mass spectroscopy, as well as thermo gravimetry, differential scanning calorimetry, and elemental analysis. Conductivity, magnetic susceptibility, and the metal and chloride contents of the complexes were also determined. The ligand exhibited a trigonal geometry, whereas the Cu+2, Pd+2, Pt+4, and Ni+2 complexesexhibited tetrahedral, square planar, octahedral, and
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show More