This paper aims to study the effect of circular Y-shaped fin arrangement to improve the low thermal response rates of a double-tube heat exchanger containing Paraffin phase change material (PCM). ANSYS software is employed to perform the computational fluid dynamic (CFD) simulations of the heat exchanger, including fluid flow, heat transfer, and the phase change process. The optimum state of the fin configuration is derived through sensitivity analysis by evaluating the geometrical parameters of the Y-shaped fin. For the same height of the fins (10 mm), the solidification time is reduced by almost 22%, and the discharging rate is enhanced by almost 26% using Y-shaped fins compared with the straight fins. The results demonstrate that the solidification time is inversely proportional to the fin's length. The heat release rate for the case with the longest fins (stem length of 10 mm) is 39 W, almost 2.8 times higher than that with the fins' stem length of 5 mm. The case with the tributary's angle of 22.5o solidified in 55 min, faster than the other studied angles. Increasing the number of fins significantly affects the solidification time and discharging rate. By increasing the number of fins from 3 to 9, the heat transfer rate improves by 194%. The advantages of circular Y-shaped fins are well known in heat transfer applications and therefore are characterized toward higher performance in this study for the first time during the solidification process.
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreObjectives: To assess pregnant women’s knowledge regarding syphilisand to find out the relationship between women’s knowledge regarding syphilis infection and demographic and reproductive variables. Methodology: A descriptive analytical study of non probable (purposive sample) of 250 pregnant women during their different gestational ages for the period (October 2nd to April 25th 2013) by using questionnaire format consists of demographic variables and items of women's knowledge regarding syphilis who are visiting primary health care centers in Al-Kharkh and Al-Rrusafa in Baghdad city. The coefficient relia
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreThis study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show MorePortable and stationary electrical generators became quite popular in Iraq soon after the shortage in national electrical
energy after 2003. Multi step risk assessment process is used in this study in the assessment of risks caused by
contamination of indoor air by lead particles emitted from domestic electrical generators. Two portable electrical
generators are tested under controlled indoor conditions (Radial LG (0.9 keV) fueled with benzene and oil and TigMax
(3 keV), fueled with benzene only). Lead particles in air were sampled by using portable dust sampler (Sniffer, L-30).
The atmospheric particulate sampling process is carried out in a flat located in the first floor of a three stories building
located in Baghdad
Radiation measuring devices need to periodic calibration process to examine their sensitivity and the extent of the response. This study is used to evaluate the radiation doses of the workers in the laboratories of the Directorate of Safety as a result of the use of point sources in calibrating of the devices in two ways, the first is the direct measurement by the FAG device and the others using RESRAD and RAD PRO programs. The total doses values using FAG were (2.57 μSv/y, 102.3 μSv/y and 20.75 μSv/y for TLD laboratory, Gamma spectroscopy analyses (GSA) laboratory and equipment store respectively, and the total doses that calculated using RESRAD and RAD PRO were 1.518 μSv/y, 76.65 μSv/y and 21.2 μSv/y for the above laboratories. t
... Show MoreThe extraction of pesticides is a critical and urgent issue in the preparation for and determination of pesticide residues. The lack of a quick, easy, and successful extraction process is the most critical and challenging problem, even if diagnostic tools have improved and pesticide residues have been better understood. This study contrasted the QuEChERS method, which uses gas chromatography with a flame ionization detector, with the LLE method, which uses liquid-liquid extraction, in order to extract pyridaben from cucumbers and spiromesifen from tomatoes. The GC-FID device was employed to ascertain the spiromesifen LOD and LOQ, which were 0.002 μg mL-1 and 0.00