Preferred Language
Articles
/
6xaZHooBVTCNdQwCHJAn
A review of ultra-high temperature materials for thermal protection system
Abstract<p>Ultra-High Temperature Materials (UHTMs) are at the base of entire aerospace industry; these high stable materials at temperatures exceeding 1600 °C are used to manage the heat shielding to protect vehicles and probes during the hypersonic flight through reentry trajectory against aerodynamic heating and reducing plasma surface interaction. Those materials are also recognized as Thermal Protection System Materials (TPSMs). The structural materials used during the high-temperature oxidizing environment are mainly limited to SiC, oxide ceramics, and composites. In addition to that, silicon-based ceramic has a maximum-use at 1700 °C approximately; as it is an active oxidation process over low temperature and water vapor environment condition. However, a great emphasis is required for developing structural materials in oxidation and rapid heating environment where the temperature is greater than 1700 °C. This review covers briefly all main types of Thermal Protection Systems (TPSs) and all the materials are used to fabricate them with the maximum operational temperatures. Also, it covers the promised UHTMs (SiC, ZrB<sub>2</sub>, HfB<sub>2</sub>, SiB<sub>6</sub> and B<sub>4</sub>C) which are currently using for several aerospace applications, especially for TPS. Besides, it discusses the oxidation of SiC, B<sub>4</sub>C, SiB<sub>6</sub>, ZrB<sub>2</sub> and HfB<sub>2</sub>. Therefore, the carbides and borides of the transition metals, Zr and Hf have a high-melting temperature and good stability in forming high-melting temperature oxides.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Composite Resin Coating for The Protection of Surfaces and Metals

The curing process of epoxy resin was investigated with some additives and fillers such as nano fumed silica with primary particle diameter of 56–58 nanometers, fine ferric oxide with an average particle diameter of 0.4 micrometer, fine calcium carbonate with an average particle diameter of 0.58 micrometer, and plasticizer, a new composite resin has been obtained. Based on present experimental results, the new composite resin shows high impact strength and hardness as well as the ability of the composite withstand to degradation from water way in. Additionally, curing time of composite was reduced to the minimum set time than epoxy resin at different temperature. This new composite resin was used appropriately for coating to protect su

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2022
Journal Name
Optik
Design new D-π-A materials for sensitizers for dye-sensitized solar cells: Quantum chemical study

Within this paper, we developed a new series of organic chromophores based on triphenyleamine (TPA) (AL1, AL-2, AL-11 and AL-22) by engineering the structure of the electron donor (D) unit via replacing a phenyle ring or inserting thiophene as a π-linkage. For the sake of scrutinizing the impact of the TPA donating ability and the spacer upon the photovoltaic, absorptional, energetic, and geometrical characteristic of these sensitizers, density functional theory (DFT) and time-dependent DFT (TD-DFT) have been utilized. According to structural characteristics, incorporating the acceptor, π-bridge and TPA does not result in a perfect coplanar conformation in AL-22. We computed EHOMO, ELUMO and bandgap (Eg) energies by performing frequency a

... Show More
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
The Effects of Long-Term Operation and High Temperature on Material Properties of Austenitic Stainless Steel Type 321H

Changes in mechanical properties of material as a result of service in different conditions can be provided by mechanical testing to assist the estimation of current internal situation of these materials, or the degree of deterioration may exist in furnaces serviced at high temperature and exceed their design life. Because of the rarity works on austenitic stainless steel material type AISI 321H, in this work, ultimate tensile strength, yield strength, elongation, hardness, and absorbed energy by impact are evaluated based on experimental data obtained from mechanical testing. Samples of tubes are extracted from furnace belong to hydrotreaterunit, also samples from un-used tube material are used to make comparisons between these properti

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Applied Thermal Engineering
Experimental evaluation of thermal efficiency, electrical efficiency, and power production of low-concentrating photovoltaic-thermal system with micro-jet channel

The efficient behavior of a low-concentrating photovoltaic-thermal system with a micro-jet channel (LCPV/T-JET) and booster mirror reflector is experimentally evaluated here. Micro-jets promote the thermal management of PV solar cells by implementing jet water as active cooling, which is still in the early stages of development. The booster mirror reflector concentrates solar irradiance into solar cells and improves the thermal, electrical, and combined efficiencies of the LCPV/T-JET system. The LCPV/T-JET system was tested under ambient weather conditions in the city of Bangi, Selangor, Malaysia, and all data was recorded between 10:00 a.m. and 4:00 p.m. Parametric studies were conducted to compare the performance of the LCPV/T-JET system

... Show More
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A Proposed Agent System for Network Monitoring

The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Photochemistry And Photobiology B: Biology
Scopus (59)
Crossref (58)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Nov 26 2017
Journal Name
Journal Of Engineering
Cathodic Protection Design Algorithms for Refineries Aboveground Storage Tanks

Storage tanks condition and integrity is maintained by joint application of coating and cathodic protection. Iraq southern region rich in oil and petroleum product refineries need and use plenty of aboveground storage tanks. Iraq went through conflicts over the past thirty five years resulting in holding the oil industry infrastructure behind regarding maintenance and modernization. The primary concern in this work is the design and implementation of cathodic protection systems for the aboveground storage tanks farm in the oil industry.

Storage tank external base area and tank internal surface area are to be protected against corrosion using impressed current and sacrificial anode cathodic protection systems. Int

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
Scopus
View Publication Preview PDF
Publication Date
Thu Aug 04 2022
Journal Name
Journal Of Nanomaterials
Thermal Management of the Melting Process in a Latent Heat Triplex Tube Storage System Using Different Configurations of Frustum Tubes

In this study, the energy charging mechanism is mathematically modeled to determine the impact of design modifications on the thermofluidic behavior of a phase change material (PCM) filled in a triplex tube containment geometry. The surface area of the middle tube, where the PCM is placed, is supported by single or multi-internal frustum tubes in vertical triplex tubes to increase the performance of the heating and cooling of the system. In addition to the ordinary straight triplex tubes, three more scenarios are considered: (1) changing the middle tube to the frustum tube, (2) changing the inner tube to the frustum tube, and (3) changing both the internal and central tubes to the frustum tubes. The impact of adopting the tube desig

... Show More
Scopus (21)
Crossref (16)
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Review of Software Watermarking

The Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication Preview PDF