Preserving and saving energy have never been more important, thus the requirement for more effective and efficient heat exchangers has never been more important. However, in order to pave the way for the proposal of a truly efficient technique, there is a need to understand the shortcomings and strengths of various aspects of heat transfer techniques. This review aims to systematically identify these characteristics two of the most popular passive heat transfer techniques: nanofluids and helically coiled tubes. The review indicated that nanoparticles improve thermal conductivity of base fluid and that the nanoparticle size, as well as the concentrations of the nanoparticles plays a major role in the effectiveness of the nanofluids. Regarding the helically coiled tubes, it was discovered that the use of a coiled tube produces secondary flows, which ultimately improves the heat transfer enhancement. The third part of the review focused on microchannels and microtubes. This is mainly due to the growing need and requirement of smaller and more compact thermal cooling systems. Thus, ultimately the result of the review indicates that a combination of all these three techniques can lead to a compact and minimized heat exchanger that uses the benefits obtained from both nanofluids and helically coiled tubes in order to improve the heat transfer rate of the thermal systems.
Worldwide, enormous amounts of waste cause major environmental issues, including scrap tires and plastic, and large waste, a consequence of the demolition of buildings, including crushed concrete, crushed clay bricks, and crushed thermo-stone. From that point, it’s possible to consider that the recycling processes for these materials and using them in the manufacturing field will reduce the adverse effects on the environment of these wastes and the consumption of natural resources. Sustainable concrete blocks can be considered as one of the products produced by using these materials as partial volume replacement of the coarse, fine aggregate, or cement content, considering their dry density, workability, absorption, co
... Show MoreAlongside the development of high-speed rail, rail flaw detection is of great importance to ensure railway safety, especially for improving the speed and load of the train. Several conventional inspection methods such as visual, acoustic, and electromagnetic inspection have been introduced in the past. However, these methods have several challenges in terms of detection speed and accuracy. Combined inspection methods have emerged as a promising approach to overcome these limitations. Nondestructive testing (NDT) techniques in conjunction with artificial intelligence approaches have tremendous potential and viability because it is highly possible to improve the detection accuracy which has been proven in various conventional nondestr
... Show MoreThe occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreWith the exception of Antarctica, all continents are home to Echinococcus species. These parasite infections are thought to be quite dangerous, causing high rates of morbidity and mortality as well as large financial losses for the cattle sector from a human and veterinary standpoint, the two primary species to consider are Echinococcus granulosus sensu lato (s.l.) and Echinococcus multilocularis, which cause cystic echinococcosis (CE) and alveolar echinococcosis (AE), respectively. The present state-of-the-art knowledge on these two parasites is compiled in this study in four major areas that are pertinent to both human and veterinary professionals: diagnosis, treatment and prevention, clinical symptoms and pathogenesis, and transm
... Show MoreIn this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images. So, this study aimed at testing the system performance at poo
... Show MoreWe present a simple model of charge transfer current through sensitizer N3 molecule contact to TiO2 and ZnO semiconductors to calculate the charge transfer current. The model underlying depends on the fundamental parameters of the charge transfer reaction and it is based on the quantum transition theory approach. A transition energy, driving energy and potential barrier have been taken into account charge transfer current at N3 / TiO2 and N3 / ZnO devices with wide polarity solvents Acetic acid, 2-Methoxyethanol, 1-Butanol, Methyl alcohol, chloroform, N,N-Dimethylacetamide and Ethyl alcohol via the quantum donor-acceptor system.The effects of the transition energy and potential barrier are computed and discussion on charge transfer current.
... Show MoreThe dye–semiconductor interface between N749 sensitized and zinc semiconductor (ZnSe) has been investigated and studied according to quantum transition theory with focusing on the electron transfer processes from the N749 sensitized (donor) to the ZnSe semiconductor (acceptor). The electron transfer rate constant and the orientation energy were studied and evaluated depended on the polarity of solvents according to refractive index and dielectric constant coefficient of solvents and ZnSe semiconductor. Attention focusing on the influence of orientation energies on the behavior of electron transfer rate constant. Differentdata of rate constant was discussion with orientation energy and effective driving energy for N749-ZnSe system.
... Show More(3) (PDF) Theoretical investigation of charge transfer at N3 sensitized molecule dye contact with TiO2 and ZnO semiconductor. Available from: https://www.researchgate.net/publication/362773606_Theoretical_investigation_of_charge_transfer_at_N3_sensitized_molecule_dye_contact_with_TiO2_and_ZnO_semiconductor [accessed May 01 2023].
Form of investment in infrastructure important factor to drive economic growth in any country, with the dwindling ability of governments to provide the necessary funds for such investments, emerged as a rising trend for private sector involvement in public projects and infrastructure, and one of these trends is the build-operate-transfer system (BOT), which commonly used in various developed and developing countries as one of the tools used in the implementation of these investments, as the private sector under this system design, finance, build and operate the project, and are re-administration of the state after a certain period under a contractual agreement between the parties of the contract. As this system provides majo
... Show More