The present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin heights ( 50mm and 35mm) and distance between the fins (3mm and 6mm). It is observed that the heat transfer increases with the increase in the frequency and Reynolds number. It is further observed that triple fins with (height=50mm and distance between the fins=3mm) gives better enhancement as compared to other
cases, The study shows that the piezoelectric actuator when mounted on the rectangular fins gives great promise for enhancing the heat transfer rate
This study aimed to improve the microencapsulation technique using a type coating the encapsulation Layer by Layer, which provide the best protection for life Lactobacillus casei in the extrusion method and use the microencapsulation of materials of the protein concentrated by protein 80% and the coating with alginate and chitosan have the results showed the variation in the difference of the binding process encapsulation yield among the types of coating through. by studying of these the effect o stability of the bio probiotic free cell and the three types coated towards three different concentrations from bile salts 0, 0.3, 0.5 and 0.7% when the periods of time different of zero and two and three hours at incubation the recorded
... Show MoreThe construction sector is considered an important and influential pivot in the national economy of any country. Nations are working to develop this sector, receiving modern and developed techniques. So, this sector can be a carrier or a receiver of modern technologies. The cost of technology transfer between the international companies that sponsor this sector is a matter of great importance, especially since different factors affect the need for this advanced technology. The cost of technology transfer in construction is related to multiple factors presented by Knowledge, equipment, plant, hardware and software. The lack of distinguishing and evaluating the direct and indirect costs in the construction sector during
... Show MoreAs COVID-19 pandemic continued to propagate, millions of lives are currently at risk especially elderly, people with chronic conditions and pregnant women. Iraq is one of the countries affected by the COVID-19 pandemic. Currently, in Iraq, there is a need for a self-assessment tool to be available in hand for people with COVID-19 concerns. Such a tool would guide people, after an automated assessment, to the right decision such as seeking medical advice, self-isolate, or testing for COVID-19. This study proposes an online COVID-19 self-assessment tool supported by the internet of medical things (IoMT) technology as a means to fight this pandemic and mitigate the burden on our nation
BOOK REVIEW
The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreThe technical of Flame Thermal Spray had been used in producing a cermet
composite based on powders of stabilized zirconium oxide containing amount of
Yatteria oxide (ZrO2- 8Y2O3) reiforced by minerals powders of bonding material
(Ni-Cr- Al- Y) in different rates of additions (25, 35, 50) on stainless steel base type
(304) after preparing it by the way of Grit Blasting.
Before heat treatment, the coated cermet layers were characterized for porosity
and electric resistivity. All samples were heat treated in vacuum furnace at different
temperature and times. The physical tests had been operated after heat treatment
and gave best results especially porosity, which found to be reduced dramatically
and producing hig
In our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the propo
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima