Theoretical and experimental investigations have been carried out on developing laminar
combined free and forced convection heat transfer in a vertical concentric annulus with uniformly
heated outer cylinder (constant heat flux) and adiabatic inner cylinder for both aiding and opposing
flows. The theoretical investigation involved a mathematical modeling and numerical solution for
two dimensional, symmetric, simultaneously developing laminar air flows was achieved. The
governing equations of motion (continuity, momentum and energy) are solved by using implicit
finite difference method and the Gauss elimination technique. The theoretical work covers heat flux
range from (200 to 1500) W/m2, Re range from 400 to 2000 and (1.36×105 ≤ Ra ≤ 1.1×107) with
radius ratio of 0.555 which is the same radius ratio used in the experimental part of this study and
Pr=0.7. The experimental work includes construct a rig consists essentially of an annulus with
uniformly heated outer cylinder and adiabatic inner cylinder to give clear insight into heat transfer
process and compare its results with that obtained in theoretical part, the range of the study are
(Re= 383, 724, 1000, 1500) and heat flux equal to (q =370, 422, 588, 980) W/m2. Numerical results
were represented by the temperature profile, axial velocity profile, outer surface temperature and
the distribution of local Nusselt number along the dimensionless axial distance. The velocity and
temperature profile results have revealed that the secondary flow created by natural convection have
significant effects on the heat transfer process. Results reveal also that the experimental local
Nusselt number along the annulus follows the same trend as present theoretical results with mean
difference 10.23 %.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
The quote of a Canadian communication scientist (Marshall McLuhan) (“The world has become an electronic village”) has become an archaic information compared to the great and rapid development of communication in the last two decades of the 20th century and what will happen later in the 21st century, to the extent that the world is called, thanks to the internet, a “Small screen” and this fact is a sign of the great progress that has been made in this field. As for the other statement of the Canadian communication scientist mentioned before “the medium itself, is the message”, it has been renewed and developed in its meaning and it’s purpose. Each new technical development in the means of communication necessarily means a me
... Show MoreBackground: To elucidate the possible role of human cytomegalovirus in pregnancy loss through induction of certain pro-inflammatory adhesion molecules.
Methods: Paraffin embedded sections of curate samples were obtained from 34 women had spontaneous abortion, and 5 women had elective termination of pregnancy (as control), and then subjected for immunohistochemistry analysis to detect human cytomegalovirus (HCMV) early protein and VCAM-1 molecule.
Results: Nine out of 34 women with spontaneous abortion were positive for HCMV early protein, with a
significantly higher expression of VCAM-1 in HCMV positive cases as compared with HCMV negative and the control groups (p = 0.05, 0.001 respectively).
Conclusion: HCMV infection may p
This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity. The capability of mixed bacterial culture was examined to remediate the diesel-contaminated soil in bio piling system. For fast ex-situ treatment of diesel-contaminated soils, the bio pile system was selected. Two pilot scale bio piles (25 kg soil each) were constructed containing soils contaminated with approximately 2140 mg/kg total petroleum hydrocarbons (TPHs). The amended soil:
... Show More
The current study aims to identify agreeableness and orientation towards voluntary work of officials in public facilities, as well as to identify the nature of the correlation between agreeableness and orientation towards voluntary work of officials in public facilities. To achieve the aims of the research, the researchers designed the agreeableness scale, which consists of (28) items in its final form. The researchers also built a scale of orientation towards voluntary work, which consists of (29) items in its final form. Psychometric properties of validity and reliability of the two scales were extracted in various ways. The researcher applied the two scales on a sample of (400) officials, the results indicated that the
... Show MorePlentiful of healthcare practice is based on a disease/treatment approach rather than a prevention one. That is, the predominant focus is on treating existing symptoms and conditions that bring the patient to healthcare setting. There is no doubt about the significance of this approach for acute conditions, but there is some question whether this is the most efficient and effective way of distributing healthcare for increasing number of diseases and limited resources.
The evidences from everywhere have showed the profound cost benefit of prevention in healthcare practice. Healthy community, therefore, is the ultimate aim in any health services planning. The priority of care giver is shifted now to promote health and prevent
... Show MoreKE Sharquie, MM Al-Waiz, AA Noaimi, Iraqi Postgraduate Medical Journal, 2008 - Cited by 1
:Background: Many studies had stated that there are marked variations in the clinical presentation of depressive states between different cultures.Objectives: The main aim of the study is to identify the symptoms profile of patients with major depressive disorder living in Baghdad.Method: Ninety two patients with major depressive disorder consulting Ibn-Rushd psychiatric teaching hospital were studied thoroughly to identify the frequency of symptoms among them. The fifth edition of the Arabic version of the Mini-International Neuropsychiatric Interview (M.I.N.I) was used to identify the Diagnostic and Statistical Manual – fourth edition (DSM-IV) symptoms. A list of other symptoms, which were found to present variably in depression acco
... Show More