The present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin heights ( 50mm and 35mm) and distance between the fins (3mm and 6mm). It is observed that the heat transfer increases with the increase in the frequency and Reynolds number. It is further observed that triple fins with (height=50mm and distance between the fins=3mm) gives better enhancement as compared to other
cases, The study shows that the piezoelectric actuator when mounted on the rectangular fins gives great promise for enhancing the heat transfer rate
Contemporary art has been widely affected by technology, and ceramics production is no exception. As an ancient art that originates from clay and other humble materials found in the ground, ceramics is considered one of the most adaptable art forms. Once it is realised how flexible ceramics as a material is, it can be easily altered into endless forms and shapes. Therefore, it is vital for ceramics practitioners to find a relationship between this wonderful material and the media of contemporary art, culture and modelling software or technology in general so that they can take their deformable art pieces to a whole new level. Such a relationship is worth investigating. Thus, for the purposes of this research, several ceramic pieces were
... Show Moreيتناول هذا البحث دراسة واحدة من المفاهيم المهمة الوافدة الى المجتمع الاسلامي، بعد أن تطور في بيئة غربية وتبنته حركة نسوية متطرفة، تدعو الى مركزية الأنثى والعداء للرجل والأسرة النمطية، إنتقل هذا المصطلح الى المجتمع الإسلامي بعد أن تبنته أجندة عالمية تحاول وباستمرار طمس معالم الفطرة الإنسانية وتغير هوية الشعوب.
This article discusses a discussion of trends and patterns of understanding and application of the concept of metaphor to various subjects that may interfere with the perspective of metaphors in translation theory, an attempt was made to use the principles and characteristics of metaphors and their fundamental tradition in translation theory, and to uncover the perspective of considering metaphor as a conceptual process. presenting its merits, since it is still considered an eccentric expression of linguistics.
This study sought to understand how critical cultural awareness was in translating English idioms into Arabic, particularly in political news where clarity and precision are paramount. The challenges that arise from the linguistic and cultural disparities between the two languages include differences in metaphor, image, and cultural reference. The study demonstrates, through the lens of Skopos Theory, how efficient translation relies on the function and intent of the text taking precedence over word-for-word equivalence and cultural context. Overall, the study establishes the need to transform idioms so that they better align with what is appropriate given the expectations of the audience. The results highlight the importance of inn
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreAbstract:
This study aims to identify the level of patients’ satisfaction among a sample of hospitalized patients in the targeted hospital (Al-Kindy Teaching Hospital, and Al-Yarmook Teaching Hospital). Moreover, this study highlights the reality of services for patients, especially in the targeted governmental teaching hospitals. The Patient Satisfaction with Nursing Care (PSNCS) has been measured in these hospitals through the revised scale by Tang et al, (2013).This scale includes four major domains; Health Information (5 items), Influencing Support (4 items), Decision Control (4 items), Specialized Technical Competence (7 items). The method of surveying patients’ opinions about the degree
... Show MoreThis work was conducted to determine the volumetric mass transfer coefficient (Ky.a) infixed bed adsorption using hexane-benzene mixture by adsorption onto a fixed bed of white silica gel. Benzene concentration was measured by gas chromatography. The effect of feed flow rate and initial concentration of benzene in hexane-benzene mixture on the volumetric mass transfer coefficient and on the adsorption capacity of silica gel was investigated.
In general, the volumetric mass transfer coefficient increases with increasing hexane flow rate, and with increasing initial concentration of benzene in the mixture. The ultimate value of (Ky.a) was at 53 ml/min of hexane flow rate with benzene initial concentration of (6.53 wt. %), and it wa
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show More