The effects of T-shaped fins on the improvement of phase change materials (PCM) melting are numerically investigated in vertical triple-tube storage containment. The PCM is held in the middle pipe of a triple-pipe heat exchanger while the heat transfer fluid flows through the internal and external pipes. The dimension effects of the T-shaped fins on the melting process of the PCM are investigated to determine the optimum case. Results indicate that while using T-shaped fins improves the melting performance of the PCM, the improvement potential is mainly governed by the fin’s body rather than the head. Hence, the proposed T-shaped fin did not noticeably improve melting at the bottom of the PCM domain; additionally, a flat fin is added to the optimal case (Added-Fin case) and compared to the No-Fin, Uniform-Fin, and Optimum T-shaped Fin cases (no added fin). The analysis shows that the total heat storage rate of the Added-Fin case increased by 141.7%, 58.8%, and 47.6% compared with the No-Fin, Uniform-Fin, and the Optimum T-shaped Fin cases, respectively. Furthermore, the total melting time for the Added-Fin case was 1882 s and decreased by 59.6%, 38.4%, and 33.6% compared with those of the No-Fin, Uniform-Fin, and the Optimum T-shaped Fin (Optimum) cases, respectively.
Inhibition of T cell derived cytokine production could help suppress osteoclast differentiation in inflammatory skeletal disorders. Bisphosphonates are typically prescribed to prevent inflammatory bone loss but are not tolerated by all patients and are associated with an increased risk of osteonecrosis of the jaw. In light of this other anti-resorptives such as phytoestrogens are being considered. However the effect of phytoestrogens on T cell-induced osteoclast formation is unclear. The effect of genistein and coumestrol on activated T cell-induced osteoclastogenesis and cytokine production was therefore examined. Concentrations of genistein and coumestrol (10−7 M) previously shown to directly inhibit osteoclast formation also suppressed
... Show MoreThis research deals with the study of the identity lost in the novel (handcuffs of paper) by Writer (Kuwaiti / Iraqi ) Yousif Hadi Mays.This is because of The strange subject presented by the writer ,Kuwait has chosen a sbace for his novel and chose apurely Kuwaiti theme. Hence the importance of the novel, as it came to the subject of identity completely dntdiffere from what we wwrote after the fall off the regime (2003), Which is related to the last coming from outside the country, which remained oscillataing between his mother,s identity where language, religion and history and the identity of the other by virtue and dazzling, and integration and here con not belong to either party. This is a violation of the taboos of
... Show MoreImpressed current cathodic protection controlled by computer gives the ideal solution to the changes in environmental factors and long term coating degradation. The protection potential distribution achieved and the current demand on the anode can be regulated to protection criteria, to achieve the effective protection for the system.
In this paper, cathodic protection problem of above ground steel storage tank was investigated by an impressed current of cathodic protection with controlled potential of electrical system to manage the variation in soil resistivity. Corrosion controller has been implemented for above ground tank in LabView where tank's bottom potential to soil was manipulated to the desired set poi
... Show MoreIntegration of laminar bubbling flow with heat transfer equations in a novel internal jacket airlift bioreactor using microbubbles technology was examined in the present study. The investigation was accomplished via Multiphysics modelling to calculate the gas holdup, velocity of liquid recirculation, mixing time and volume dead zone for hydrodynamic aspect. The temperature and internal energy were determined for heat transfer aspect.
The results showed that the concentration of microbubbles in the unsparged area is greater than the chance of large bubbles with no dead zones being observed in the proposed design. In addition the pressure, due to the recirculation velocity of liquid around the draft
... Show MoreA numerical investigation of mixed convection in a horizontal annulus filled with auniform fluid-saturated porous medium in the presence of internal heat generation is carried out.The inner cylinder is heated while the outer cylinder is cooled. The forced flow is induced by thecold outer cylinder rotating at a constant angular velocity. The flow field is modeled using ageneralized form of the momentum equation that accounts for the presence of porous mediumviscous, Darcian and inertial effects. Discretization of the governing equations is achieved usinga finite difference method. Comparisons with previous works are performed and the results showgood agreement. The effects of pertinent parameters such as the Richardson number and internalRay
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show More