The two dimensional steady, combined forced and natural convection in vertical channel is
investigated for laminar regime. To simulate the Trombe wall channel geometry properly, horizontal
inlet and exit segments have been added to the vertical channel. The vertical walls of the channel are
maintained at constant but different temperature while horizontal walls are insulated. A finite
difference method using up-wind differencing for the nonlinear convective terms, and central
differencing for the second order derivatives, is employed to solve the governing differential
equations for the mass, momentum, and energy balances. The solution is obtained for stream
function, vorticity and temperature as dependent variables by iterative technique known as successive
substitution with overrelaxation. The flow and temperature patterns in the channel are obtained for
Reynolds numbers and Grashof number ranging from 25 to 100 and (100 to 1,000,00,) respectively.
A computer program ( Fortran 90 ) is built to calculate the fraction factor and the total
average Nusselt number (Nu) also the average heat transfer Q in steady state and for Aspect ratio Ar
(10) and Grashof number GR (10 2 − 10 5 ), the fluid Prandtl number is fixed at (Pr=0.733) and
Reynolds number Re (25-100).
The results show reasonable representation to the relation between Nusselt number and friction
factor with other parameters (Ar, GR and Re). Nu is increased with increasing Re and GR but it
decreases with Ar increase and (Q) is increased with increasing Re ,GR and Ar. At the same time, the
product friction factor(fRe) increased with (GR) and (Ar)increased and (Re )decrease.
Comparison of the result with the previous work shows a good agreement
Key generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the
... Show MoreMany studies have been published to address the growing issues in wireless communication systems. Space-Time Block Coding (STBC) is an effective and practical MIMO-OFDM application that can address such issues. It is a powerful tool for increasing wireless performance by coding data symbols and transmitting diversity using several antennas. The most significant challenge is to recover the transmitted signal through a time-varying multipath fading channel and obtain a precise channel estimation to recover the transmitted information symbols. This work considers different pilot patterns for channel estimation and equalization in MIMO-OFDM systems. The pilot patterns fall under two general types: comb and block types, with
... Show MoreThis research asks what are negative social behaviours in the Kurdistan Region of Iraq (KRI) raised by the talk shows on the (NRT) channel? Furthermore, it aims to identify the most significant themes addressed by talk shows on the (NRT) channel regarding negative social behaviours in the KRI by using the content analysis approach through non-random purposive sampling to understand the dialogue contents that dealt with this subject. This study has reached a set of results: through its talk shows, the (NRT) channel attempts to create a media vision about the spread of negative social behaviours in the KRI and stand up to the dangers associated with these behaviours. At the same time, those programs tried to marginalize the behaviours that
... Show MoreThe study aimed to survey mushroom species from fields among herbs, palm trunks, and trees in central Iraq and to identify them on the basis of morphological and molecular characteristics. As a molecular identification result with polymerase chain reaction six species were recorded (with eight isolates): Agaricus bitorquis (Quéllt) Saccardo. 1887 (SHA14); Candolleomyces candolleanus (Fr.) D. Wächter & Melzer, 2020 (SHA15); Cyclocybe cylindracea (D.C.) Vizzini & Angelini, 2014 (SHA13); Leucoagaricus hesperius Vellinga, 2010 (SHA16); Volvariella sp. (SHA17), and Volvopluteus gloiocephalus (D. C.) Vizzini, Contu & Justo, 2011 (SHA10, SHA101 and SHA12), belonging to four families of Basidiomycetes: Agaricaceae, Pluteaceae,
... Show MoreWe study the physics of flow due to the interaction between a viscous dipole and boundaries that permit slip. This includes partial and free slip, and interactions near corners. The problem is investigated by using a two relaxation time lattice Boltzmann equation with moment-based boundary conditions. Navier-slip conditions, which involve gradients of the velocity, are formulated and applied locally. The implementation of free-slip conditions with the moment-based approach is discussed. Collision angles of 0°, 30°, and 45° are investigated. Stable simulations are shown for Reynolds numbers between 625 and 10 000 and various slip lengths. Vorticity generation on the wall is shown to be affected by slip length, angle of incidence,
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreIn the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t
... Show More