Numerical Investigation was done for steady state laminar mixed convection and thermally and hydrodynamic fully developed flow through horizontal rectangular duct including circular core with two cases of time periodic boundary condition, first case on the rectangular wall while keeping core wall constant and other on both the rectangular duct and core walls. The used governing equations are continuity momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C.) methods. The Finite Difference approach with the Line Successive Over Relaxation (LSOR) method is used to obtain all the computational results the (B.F.C.) method is used to generate the grid of the problem. A computer program (Fortan 90) is built to calculate Nusselt Number (Nu) in steady state. The fluid Prandtl number is 0.7 Rayleigh Number 1<Ra<106, Reynolds number 1<Re<2000. For the range of parameters considered, results show that the time periodic boundary condition enhance heat transfer. It is also indicated in the results that heat transfer from the surface of the circle exceeds that of the rectangle duct. Comparisons with other research show good agreement.
Mixed ligands reaction of [2-[(3-hydroxyphenyl)diazinyl]-1,2-benzothiazol-3(2H)-one-1,1-dioxide] (H2L, primary ligand) and bipyridyl (secondary ligand) with salts of Cr(III), Mn(II), Fe(III), Co(II) and Ni(II) was performed. A series of air-stable complexes with distinctive octahedral moieties was created by equal molar ratio (1:1:1). The formation of these compounds was verified using detecting analysis techniques incorporating mass spectra, which validated the achieved geometries. Fourier transform infrared (FTIR) analysis demonstrated how the ligands (H2L and bipyridyl) are chelated as tridentate (ONO) and bidentate (NN) groups, respectively and the coordination with the metal ions. Thermal decomposition studies using pyrolysis (
... Show MoreStrategic leadership is the main source to enable organizations of excellence in light of turbulent environment, it is also the capabilities of organizational renewal organization’s ability to anticipate changes that take place or possible occurrence.
As a result of the many changes that characterize the environment where they operate researched hospitals, many of them began looking for ways to help it achieve a lot of their own competitive advantages.
The subject of organizational renewal capabilities of subjects that are not obvious interest in the Arab environment in general and Iraq in particular, and longer. The problem of the research and field presence of deficiencies in
... Show MoreA method was developed that offers a rapid, simple and accurate technique for the determination of chlorophenols at trace levels in aqueous samples with very limited volumes of organic solvents. These compounds were acetylated, then preliminarily extracted with n-hexane. The enriched chlorophenols were directly analyzed using gas chromatography with an electron-capture detector. The detection limits were in the range of 0.001–0.005 mg/L, except for 2-chlorophenol, which was always above 0.013 mg/L. Relative standard deviation for the spiked water samples ranged from 2.2 to 6.1%, while relative recoveries were in the range of 67.1 to 101.3%.
This paper presents an analytical study for the magnetohydrodynamic (MHD) flow of a generalized Burgers’ fluid in an annular pipe. Closed from solutions for velocity is obtained by using finite Hankel transform and discrete Laplace transform of the sequential fractional derivatives. Finally, the figures are plotted to show the effects of different parameters on the velocity profile.
Maintenance of machine tools can be improved significantly by analyzing the operating of manufacturing process with the real-time monitoring system for 3-D single point deformation measurements. Therefore, the process of manufacturing could be optimized with less cost. Recently, wireless technology and internet of things (IOT) applied on intelligent machine has witnessed a significant advance with augmented virtuality, the analysis and the process certainly would contribute to enhance the intelligence of that machine. This paper presents a group of the wireless sensors and 3D animation technologies for data monitoring and analyzing. Three degree of freedom robotic hand structure has been selected as a prototype to be form the process of the
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreToday many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More