This study numerically intends to evaluate the effects of arc-shaped fins on the melting capability of a triplex-tube confinement system filled with phase-change materials (PCMs). In contrast to situations with no fins, where PCM exhibits relatively poor heat response, in this study, the thermal performance is modified using novel arc-shaped fins with various circular angles and orientations compared with traditional rectangular fins. Several inline and staggered layouts are also assessed to maximize the fin’s efficacy. The effect of the nearby natural convection is further investigated by adding a fin to the bottom of the heat-storage domain. Additionally, the Reynolds number and temperature of the heat-transfer fluid (HTF) are evaluated. The outcomes showed that the arc-shaped fins could greatly enhance the PCMs’ melting rate and the associated heat-storage properties. The melting rate is 17% and 93.1% greater for the case fitted with an inline distribution of the fins with a circular angle of 90° and an upward direction, respectively, than the cases with uniform rectangular fins and no fins, which corresponded to the shorter melting time of 14.5% and 50.4%. For the case with arc-shaped fins with a 90° circular angle, the melting rate increases by 9% using a staggered distribution. Compared to the staggered fin distribution, adding an extra fin to the bottom of the domain indicates adverse effects. The charging time reduces by 5.8% and 9.2% when the Reynolds number (Re) rises from 500 to 1000 and 1500, respectively, while the heat-storage rate increases by 6.3% and 10.3%. When the fluid inlet temperature is 55°C or 50°C, compared with 45°C, the overall charging time increases by 98% and 47%, respectively.
Zinc sulfide (ZnS) thin films were deposited on glass substrates using pulsed laser deposition technique. The laser used is the Q-switched Nd: YAG laser with 1064nm wavelength and 1Hz pulse repetition rate and varying laser energy 700mJ-1000mJ with 25 pulse. The substrate temperature was kept constant at 100°C. The structural, morphological and optical properties of ZnS thin films were characterized with X-ray diffraction (XRD), scanning electron microscopy (SEM), atomic force microscope (AFM) and UV-VIS spectrophotometer.
We use of multi-choice Goal Programming (MCGP), which is a developed model of Goal Programming where it is used in circumstances of the multiplicity and difference of goals when choosing between decision alternatives in cases of allocating resources, as it is a model that seeks to find the closest and best solutions to the specific values of the goals within the aspiration levels, as the first goal in the multi-choice goal programming model that is used to reduce the total cost of storage and shortage, while the other goal was to reduce the difference between the real demand that the hospitals need from the blood transfusion center and the units that already achieved. The case Iraqi Center
... Show MoreThis paper investigates a new approach to the rapid control of an upper limb exoskeleton actuator. We used a mathematical model and motion measurements of a human arm to estimate joint torque as a means to control the exoskeleton’s actuator. The proposed arm model is based on a two-pendulum configuration and is used to obtain instantaneous joint torques which are then passed into control law to regulate the actuator torque. Nine subjects volunteered to take part in the experimental protocol, in which inertial measurement units (IMUs) and a digital goniometer were used to measure and estimate the torque profiles. To validate the control law, a Simscape model was developed to simulate the arm model and control law in which measurem
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreAbstract:
This research seeks to test the influence of intellectual capital as an explanatory variable and its components (human capital, structural capital, relational capital) and sustainable competitive performance as a responsive variable and its components (reducing service delivery cycle time, rapid response to market demand, increasing customer satisfaction, providing better Quality of service, increasing market share)” through a field study, and here the research problem was diagnosed in an attempt to answer the following question: Is there awareness among the senior management within the private colle
... Show MoreThe research study and analysis of the integration of marketing communications and their impact on the marketing performance of a number of telecom companies, as included in the research problem to know the role of marketing communications community in achieving sales and market share, profitability and customer satisfaction. The importance of research begins to be the right choice for the elements of marketing communications, lead to savings in time, effort and money and create a more idea about the effectiveness of the application of the concept of integration. The research to determine the role of marketing communications in promoting the integration of the marketing performance of companies in the field of sales and marke
... Show MoreAbstract
In the present study, composites were prepared by Hand lay-up molding. The composites constituents were epoxy resin as a matrix, 6% volume fractions of glass fibers (G.F) as reinforcement and 3%, 6% volume fractions of preparation natural material (Rice Husk Ash, Carrot Powder, and Sawdust) as filler. Studied the erosion wear behavior and coating by natural wastes (Rice Husk Ash) with epoxy resin after erosion. The results showed the non – reinforced epoxy have lower resistance erosion than natural based material composites and the specimen (Epoxy+6%glass fiber+6%RHA) has higher resistance erosion than composites reinforced with carrot powder and sawdust at 30cm , angle 60
... Show MoreThis research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri
Hydroponics is the cultivation of plants by utilizing water without using soil which emphasizes the fulfillment of the nutritional needs of plants. This research has introduced smart hydroponic system that enables regular monitoring of every aspect to maintain the pH values, water, temperature, and soil. Nevertheless, there is a lack of knowledge that can systematically represent the current research. The proposed study suggests a systematic literature review of smart hydroponics system to overcome this limitation. This systematic literature review will assist practitioners draw on existing literature and propose new solutions based on available knowledge in the smart hydroponic system. The outcomes of this paper can assist future r
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.