Low-temperature stratification, high-volumetric storage capacity, and less-complicated material processing make phase-changing materials (PCMs) very suitable candidates for solar energy storage applications. However, their poor heat diffusivities and suboptimal containment designs severely limit their decent storage capabilities. In these systems, the arrangement of tubes conveying the heat transport fluid (HTF) plays a crucial role in heat communication between the PCM and HTF during phase transition. This study investigates a helical coil tube-and-shell thermal storage system integrated with a novel central return tube to enhance heat transfer effectiveness. Three-dimensional computational fluid dynamics simulations compare the proposed design against a baseline helical coil system without a return tube under equivalent conditions. Outcomes quantify the return tube's efficacy in augmenting heat transfer uniformity and accelerating phase transition. Adding the return tube markedly boosts heat storage and recovery rates, increasing charging by 88% and discharging by 56% versus the baseline. Moreover, total phase transition time reduces by 48% for melting and 36% for solidification with the return tube. The accelerated charging stems from sustained convective heat transfer inside the return tube even as the molten layer thickens. Meanwhile, enhanced solidification results from ongoing cooling of inner regions. Isotherm analysis visualizes the return tube's efficacy in maintaining thermal uniformity throughout the phase transition process. Overall, the return tube significantly improves PCM thermal response, demonstrating a novel but straightforward approach to address heat transfer limitations in latent thermal storage systems.
Reseach target the most important topic, is Activity and ProfitabilityIndictors Analysis for
Nationality and Iraqi Insurance Company, In order to stand on them ability to cover its risks
and explore the efficiency asset and its avialible resources using to determine them abilities to
profit generation from its insurance activity. The analysis was focus to examine their profit
and activity power, and test the significant differences aming them performance. Test 2
hypothese that is related and result it sign that the 2 company no has significant differences at
profitability and activity level. The research depend on coneclusion, recommended two
company to work at efficiency with cost element of insurance activity in or
Products’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.
 
... Show MoreAbstract
Background: Scabies is a skin infestation by the Sarcoptes scabiei mite. Scabies is transmitted through close personal contact. Settings like hospitals, prisons and childcare centers are at greater risk of outbreaks. Both male and female may be infected with scabies in any age groups. It is common in tropical climate countries poor people who live in rural areas and among displaced patients. It rises significantly among low economic status because skin diseases are significantly associated with a higher crowding index.
Objectives: To estimate the prevalence of scabies in Al- Daseem region and identify factors associated with an increased risk of scabies among pat
... Show MorePost-structural critical studies highlighted the importance of studying the texts surrounding the text as an important part in the process of receiving and understanding texts, and although this topic was dealt with by the ancient Arabs and Europeans, interest in it appeared clearly after the appearance of Gerard Genet's book (SEUILS), which separated it Text Thresholds. Or what he called paratexte, and dealt with them with interest as he reads them on books. With the development of semiotic studies, interest in paratexte studies began in a broader way and in various literary and non-literary texts, including journalistic texts. And since specialized magazines are one of the press releases that enjoy their privacy in terms of topics and
... Show MoreBackground: Diarrheal diseases are still a major public health problem especially in developing countries, due to their high morbidity & mortality rates, moreover the lagest
number of deaths with diarrheal diseases are due to persistent diarrheal states.We attemted to evaluate the size of the problem in our infants, and assess risk factors & outcome.
Methods: A retrospective study was performed in Al-Kadhemya teaching hospital, to evaluate diarrheal cases in under 2 years of age children , admitted to hospital during the period (Dec. 1991- Dec. 2001), from a total of 863, chronic diarrheal cases formed 286 (33.14%) that were evaluated for certain variables; epidemiology & risk factors etiology ,
In this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect
... Show MoreAbstract
The present paper attempts to detect the level of (COVID-19) pandemic panic attacks among university students, according to gender and stage variables.
To achieve this objective, the present paper adopts the scale set up by (Fathallah et al., 2021), which has been applied electronically to a previous cross-cultural sample consisting of (2285) participants from Arab countries, including Iraq. The scale includes, in its final form, (69) optional items distributed on (6) dimensions: physical symptoms (13) items, psychological and emotional symptoms (12) items, cognitive and mental symptoms (11) items, social symptoms (8) items, general symptoms (13) items and daily living practices (12) items
... Show MoreBinary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More