Preferred Language
Articles
/
BIbl0YYBIXToZYALYbWz
Natural Convection Effect on Solidification Enhancement in a Multi-Tube Latent Heat Storage System: Effect of Tubes’ Arrangement
...Show More Authors

The solidification process in a multi-tube latent heat energy system is affected by the natural convection and the arrangement of heat exchanger tubes, which changes the buoyancy effect as well. In the current work, the effect of the arrangement of the tubes in a multi-tube heat exchanger was examined during the solidification process with the focus on the natural convection effects inside the phase change material (PCM). The behavior of the system was numerically analyzed using liquid fraction and energy released, as well as temperature, velocity and streamline profiles for different studied cases. The arrangement of the tubes, considering seven pipes in the symmetrical condition, are assumed at different positions in the system, including uniform distribution of the tubes as well as non-uniform distribution, i.e., tubes concentrated at the bottom, middle and the top of the PCM shell. The model was first validated compared with previous experimental work from the literature. The results show that the heat rate removal from the PCM after 16 h was 52.89 W (max) and 14.85 W (min) for the cases of uniform tube distribution and tubes concentrated at the bottom, respectively, for the proposed dimensions of the heat exchanger. The heat rate removal of the system with uniform tube distribution increases when the distance between the tubes and top of the shell reduces, and increased equal to 68.75 W due to natural convection effect. The heat release rate also reduces by increasing the temperature the tubes. The heat removal rate increases by 7.5%, and 23.7% when the temperature increases from 10 °C to 15 °C and 20 °C, respectively. This paper reveals that specific consideration to the arrangement of the tubes should be made to enhance the heat recovery process attending natural convection effects in phase change heat storage systems.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Tolerance and its impact on building society
...Show More Authors

Tolerance and its impact on building society

View Publication Preview PDF
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
On Čech fuzzy soft bi-clouser spaces
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
On Large-Lifting and Large-Supplemented Modules
...Show More Authors

      In this paper, we introduce the concepts of Large-lifting and Large-supplemented modules as a generalization of lifting and supplemented modules.  We also give some results and properties of this new kind of modules.

Scopus (1)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Global tolerance and its impact on peace
...Show More Authors

The concept of tolerance is gaining its importance in the midst of an international society suffering from violence, wars and internal and international crises. It is practiced by extremist and extremist forces and movements acting in the name of religion to exclude the different Muslim and non-Muslim people according to the unethical practices and methodologies of Islamic law and reality. , Cultural, civilization .. that distinguish our world today. The society today is suffering from the ideas of the intellectual and aesthetic views of the different ideologically, ethnically, culturally and religiously in the world of the South. This is what the end-of-history thesis of Fukuyama and the clash of civilizations represented to Huntington.

... Show More
View Publication
Crossref