Consecutive charging and discharging of a PCM-based plate heat exchanger with zigzag configuration
...Show More Authors
A series of laboratory model tests has been carried out to investigate the using of pomegranate sticks mat as reinforcement to increase the bearing capacity of footing on loose sand. The influence of depth and length of pomegranate sticks layer was examined. In the present research single layer of pomegranate sticks reinforcement was used to strengthen the loose sand stratum beneath the strip footing. The dimensions of the used foundation were 4*20 cm. The reinforcement layer has been embedded at depth 2, 4 and 8 cm under surcharge stresses . Reinforcing layer with length of 8 and 16 cm were used. The final model test results indicated that the inclusion of pomegranate sticks reinforcement is very effective in improvement the loading cap
... Show MoreMechanical degradation hampers the practical usage of polymers for turbulent drag reduction
application. Mechanical degradation refers to the chemical process in which the activation energy of
polymer chain scission is exceeded by mechanical action on the polymer chain, and bond rupture
occurs. When a water-soluble polymer and surfactant are mixed in water solution, the specific structures
(aggregates) are formed, in which polymer film is formed around micelle. In this work, Xanthan gum (XG) –
Sodium lauryl ether sulfate (SELS) complex formation and its effect on percentage viscosity reduction
(%VR) was studied. It was found that SELS surfactant reduced the mechanical degradation of XG much
more efficiently than th
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThis paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MorePhotodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
The present study aims to identify wisdom-based thinking and its relationship to psychological capital. It further aims to find out the differences in the level of wisdom-based thinking and psychological capital according to the variables of gender and specialization (scientific, humanities). To achieve this, the study has been conducted on a sample of (380) male and female students. The two scales, wisdom-based thinking and psychological capital are implemented to the sample after being constructed by the researcher and after ensuring their psychometric characteristics' suitability for the study's aims. Results concerning the first aim have shown that there is a significant relationship among students. The second aim has revealed that t
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show More