Preferred Language
Articles
/
joe-204
Entropy Generation of Shell and Double Concentric Tubes Heat Exchanger
...Show More Authors

Entropy generation was studied for new type of heat exchanger (shell and double concentric tubes heat exchanger). Parameters of hot oil flow rate, temperature of inlet hot oil and pressure drop were investigated with the concept of entropy generation. The results showed that the value of entropy generation increased with increasing the flow rate of hot oil and when cold water flow rate was doubled from 20 to 40 l/min, these values were larger. On the other hand, entropy generation increased with increasing the hot oil inlet temperature at a certain flow rate of hot oil. Furthermore, at a certain hot oil inlet temperature, the entropy generation increased with the pressure drop at different hot oil inlet flow rates. Finally, in order to keep up with modern technology, infrared thermography camera was used in order to measure the temperatures. The entropy generation was determined with lower values when infrared thermography camera was used to measure the temperatures, compared with the values obtained by using thermocouples.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Propulsion And Power Research
Heat transfer enhancement from heat sources using optimal design of combined fins heat-sinks
...Show More Authors

View Publication
Scopus (10)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Jul 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Measurement of double-thinking among university students
...Show More Authors

Current search targeted to:
  1 - Measurement of double-thinking among university students.
  2 - Identify the significant differences in the degrees of double-thinking members of the sample according to the variables of sex (male - female), specialty (I know - a human).
      To achieve the objectives of the research chose researcher samples from the community of the first search for statistical analysis, has reached 400 students, and the second sample of the application of the final, has reached (480) students were selected randomly with simple check of equal value, and the researcher building a search tool double think, After the completion of the scale-building measures think

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
GENERATION OF MPSK SIGNAL USING LOGIC CIRCUITS
...Show More Authors

The traditional technique of generating MPSK signals is basically to use IQ modulator that involves analog processing like multiplication and addition where inaccuracies may exist and would lead to imbalance problems that affects the output modulated signal and hence the overall performance of the system. In this paper, a simple method is presented for generating the MPSK using logic circuits that basically generated M-carrier signals each carrier of different equally spaced phase shift. Then these carriers are time multiplexed, according to the data symbols, into the output modulated signal.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 22 2024
Journal Name
Proceedings Of The Acm/ieee 27th International Conference On Model Driven Engineering Languages And Systems
Requirement-Driven Generation of Distributed Ledger Architectures
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Probabilistic Model building using the Transformation Entropy for the Burr type –xii Distribution
...Show More Authors

Entropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 29 2023
Journal Name
International Journal Of Nanoscience
Preparation of N-A Cysteine-capped CdTe/CdS/ZnS core/shell/shell QDs as a Selective Probe for Detecting Damaged DNA
...Show More Authors

In this study, NAC-capped CdTe/CdS/ZnS core/double shell QDs were synthesized in an aqueous medium to investigate their utility in distinguishing normal DNA from mutated DNA extracted from biological samples. Following the interaction between the synthesized QDs with DNA extracted from leukemia cases (represents damaged DNA) and that of healthy donors (represents undamaged DNA), differential fluorescent emission maxima and intensities were observed. It was found that damaged DNA from leukemic cells DNA-QDs conjugates at 585 nm while intact DNA (from healthy subjects) DNA–QDs conjugates at 574 nm. The obtained results from the optical analyses indicate that the prepared QDs could be utilized as probe for detecting disrupted DNA th

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2024
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Wireless channel-based ciphering key generation: effect of aging and treatment
...Show More Authors

Key generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Al-khwarizmi Engineering Journal
Recent Tools of Software-Defined Networking Traffic Generation and Data Collection
...Show More Authors

أثبتت الشبكات المحددة بالبرمجيات (SDN) تفوقها في معالجة مشاكل الشبكة العادية مثل قابلية التوسع وخفة الحركة والأمن. تأتي هذه الميزة من SDN بسبب فصل مستوى التحكم عن مستوى البيانات. على الرغم من وجود العديد من الأوراق والدراسات التي تركز على إدارة SDN، والرصد، والتحكم، وتحسين QoS، إلا أن القليل منها يركز على تقديم ما يستخدمونه لتوليد حركة المرور وقياس أداء الشبكة. كما أن المؤلفات تفتقر إلى مقارنات بين الأدوات والأ

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Biosorption of Lead, Cadmium, and Zinc onto Sunflower Shell: Equilibrium, Kinetic, and Thermodynamic Studies
...Show More Authors

The present study deals with the application of an a bundant low cost biosorbent sunflower shell for metal ions removal. Lead, Cadmium and Zinc were chosen as model sorbates. The influences of initial pH, sorbent dosage, contact time, temperature and initial metal ions concentration on the removal efficiency were examined. The single ion equilibrium sorption data were fitted to the non-competitive Langmuir and Freundlich isotherm models. The Freundlich model represents the equilibrium data better than the Langmuir model. In single, binary and ternary component systems,Pb+2 ions was the most favorable component rather than Cd+2 and Zn+2 ions. The biosorption kinetics for the three metal ions followed the p

... Show More
View Publication Preview PDF