Abstract
In this paper presents two dimensional turbulent flow of different nanofluids and ribs configuration in a circular tube have been numerically investigation using FLUENT 6.3.26. Two samples of CuO and, ZnO nanoparticles with 2% v/v concentration and 40 nm as nanoparticle diameter combined with trapezoidalribs with aspect ratio of p/d=5.72 in a constant tube surface heat flux were conducted for simulation. The results showed that heat flow as Nusselt number for all cases raises with Reynolds number and volume fraction of nanofluid, likewise the results also reveal that ZnO with volume fractions of 2% in trapezoidal ribs offered highest Nusselt number at Reynolds number of Re= 30000.
Key
... Show MoreThis work presents an innovative approach to enhancing the performance of concrete with reclaimed asphalt pavement (RAP) aggregates using titanium dioxide (TiO2) nanoparticles. Traditional limestone coarse aggregates were partially replaced with 30% and 50% RAP aggregates; a subset of mixtures containing RAP aggregates was treated with TiO2 nanoparticles. The rheological, mechanical, and long-term properties of concrete, along with changes in its chemical composition following the addition of RAP and TiO2, were evaluated. Results revealed that using 30% and 50% RAP in concrete mixtures reduced their compressive strength by 18% and 27%, respectively. However, using TiO2 in those mixtures enhanced their compressive strength by 8.7% an
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThis work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show MoreAbstract Additive manufacturing has been recently emerged as an adaptable production process that can fundamentally affect traditional manufacturing in the future. Due to its manufacturing strategy, selective laser melting (SLM) is suitable for complicated configurations. Investigating the potential effects of scanning speed and laser power on the porosity, corrosion resistance and hardness of AISI 316L stainless steel produced by SLM is the goal of this work. When compared to rolled stainless steel, the improvement is noticeable. To examine the microstructure of the samples, the optical microscopy (OM), scanning electron microscopy (SEM), and EDX have been utilized. Hardness and tensile strength were us
... Show MoreRecently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical.
... Show More
