An experimental and theoretical analysis was conducted for simulation of open circuit cross flow heat
exchanger dynamics during flow reduction transient in their secondary loops. Finite difference
mathematical model was prepared to cover the heat transfer mechanism between the hot water in the
primary circuit and the cold water in the secondary circuit during transient course. This model takes under
consideration the effect of water heat up in the secondary circuit due to step reduction of its flow on the
physical and thermal properties linked to the parameters that are used for calculation of heat transfer
coefficients on both sides of their tubes. Computer program was prepared for calculation purposes which
cover all the variables that affect such type of transient mechanisms. The effect of the power density in
the primary circuit and the water flow reduction percentage on the average temperature build up of the
water in the primary circuit was investigated. The elapsed time required for the primary circuit average
temperature to reach a steady state value was also calculated. These calculations were supported with
experimental measurements conducted on a standard cross flow heat exchanger apparatus. The
experimental results were compared with the theoretical results for certain power density value at
different flow reduction percentages which show a reliable agreement. This relative agreement was
necessary to consider the mathematical model with certain assurance for calculating transient parameters
for higher power densities that are out of apparatus ranges. The results proved that water average
temperature build up in the primary circuit has sharp tendency when the percentage of flow reduction in
the secondary circuit reach 25% of its nominal values.
In this paper, the problem of developing turbulent flow in rectangular duct is investigated by obtaining numerical results of the velocity profiles in duct by using large eddy simulation model in two dimensions with different Reynolds numbers, filter equations and mesh sizes. Reynolds numbers range from (11,000) to (110,000) for velocities (1 m/sec) to (50 m/sec) with (56×56), (76×76) and (96×96) mesh sizes with different filter equations. The numerical results of the large eddy simulation model are compared with k-ε model and analytic velocity distribution and validated with experimental data of other researcher. The large eddy simulation model has a good agreement with experimental data for high Reynolds number with the first, seco
... Show MoreThe problem of the research is indicated by answering the following questions: 1) what are the attitudes of the Arabic language teachers towards homework?
2) Do the Arabic language teachers differ in their attitudes towards homework according to their specialization? 3) Do the Arabic language teachers differ in their attitudes towards homework according to their gender (male and female)? According to the three questions asked above, we may state the following hypotheses. There is no statistically significant difference between the average of the marks of Arabic language teachers in the real practice of the scale of the attitudes towards their homework and their average in the hypothetical practice of the
... Show MoreThe research falls in to three sections: the first section has two parts; the first one includes a general description of the research: its problem, aim, limitations, methodology, and the terminological definition. The second part presents historical background of the weekly school speeches in Iraq and their types. Section Two has two parts: the first is about the principles of writing weekly speeches, their elements, and principals, their conditions. As for the second part, it is about introducing four samples of weekly school speeches distributed as two taken from Al-karkh sector and two taken from Al-rusafa'a sector. The third section: analyzing the content of the sample and giving a short historical background abo
... Show MoreObjective: to identify the secondary school adolescent's obesity, and to find out the relationship between
adolescents obesity characteristics and their family history.
Methodology: A cross-sectional study was carried out among 537 adolescents (270 boys and 267 girls) aged 12-15
years selected by means of a multistage stratified random sampling technique.
Results: the prevalence of obesity among adolescents was 22.3%. (55.8%) of the obese adolescents were male,
(42.5%) their age is (13) years old, and (79.2%) of them coming from middle level of socio economic status score.
There are a significant relationship between obese adolescents and their family history of obesity which indicated
that obese father, and obese br
High-resolution imaging of celestial bodies, especially the sun, is essential for understanding dynamic phenomena and surface details. However, the Earth's atmospheric turbulence distorts the incoming light wavefront, which poses a challenge for accurate solar imaging. Solar granulation, the formation of granules and intergranular lanes on the sun's surface, is important for studying solar activity. This paper investigates the impact of atmospheric turbulence-induced wavefront distortions on solar granule imaging and evaluates, both visually and statistically, the effectiveness of Zonal Adaptive Optics (AO) systems in correcting these distortions. Utilizing cellular automata for granulation modelling and Zonal AO correction methods,
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreDue to the urgent need to develop technologies for continuous glucose monitoring in diabetes individuals, poten tial research has been applied by invoking the microwave tech niques. Therefore, this work presents a novel technique based on a single port microwave circuit, antenna structure, based on Metamaterial (MTM) transmission line defected patch for sensing the blood glucose level in noninvasive process. For that, the proposed antenna is invoked to measure the blood glu cose through the field leakages penetrated to the human blood through the skin. The proposed sensor is constructed from a closed loop connected to an interdigital capacitor to magnify the electric field fringing at the patch center. The proposed an tenna sensor i
... Show More