This work evaluates the influence of combining twisted fins in a triple-tube heat exchanger utilised for latent heat thermal energy storage (LHTES) in three-dimensional numerical simulation and comparing the outcome with the cases of the straight fins and no fins. The phase change material (PCM) is in the annulus between the inner and the outer tube, these tubes include a cold fluid that flows in the counter current path, to solidify the PCM and release the heat storage energy. The performance of the unit was assessed based on the liquid fraction and temperature profiles as well as solidification and the energy storage rate. This study aims to find suitable and efficient fins number and the optimum values of the Re and the inlet temperature of the heat transfer fluid. The outcomes stated the benefits of using twisted fins related to those cases of straight fins and the no-fins. The impact of multi-twisted fins was also considered to detect their influences on the solidification process. The outcomes reveal that the operation of four twisted fins decreased the solidification time by 12.7% and 22.9% compared with four straight fins and the no-fins cases, respectively. Four twisted fins improved the discharging rate by 12.4% and 22.8% compared with the cases of four straight fins and no-fins, respectively. Besides, by reducing the fins’ number from six to four and two, the solidification time reduces by 11.9% and 25.6%, respectively. The current work shows the impacts of innovative designs of fins in the LHTES to produce novel inventions for commercialisation, besides saving the power grid.
الخلاصة
تشير نظريات علم اجتماع المعرفة الى ان ظهور مفهوم معين او سقوطه لايتم بمحض الصدفة، بل نتيجة تفاعل مجموعة من العوامل الثقافية والسياسية وحتى الاقتصادية ومن هنا فأن ظهور مفهوم الاثنية كان محصلة عوامل كثيرة خصوصاً بعد ان اصبح موضوع الاثنية في العقود الاخيرة من القرن الماضي وبداية القرن الواحد والعشرين محور نقاش رئيس في ميدان البحث الاجتماعي والسياسي، ليس في
... Show MoreABSTRACT : Alzheimer’s disease (AD) is one of the most common inflammatory neurodegenerative diseases linked with dementia, it is characterized by the deposition of amyloid beta-peptide (Ab) in the brain. The present study aims to innovate a biochemical relationship between AD and interleukin 38 (IL-38) as an anti-inflammatory cytokine, expose novel mechanisms and concepts regarding other biochemical parameters studied previously or recently in AD patients and also examine the biochemical action of memantine (10 mg daily) on AD patients. Sixty (60) diagnosed AD patients participated in the present study and classified into four (4) groups: G3 were composed of (15) newly diagnosed males (52-78) years / without treatment, G4 composed of (15
... Show MoreThe Child is the first sedum for the human society performing, and we deal in our
research to explain the nature of the mutual relations in between the form and the medicine
social caring foundation. So the motherhood and the childhood nowadays become the most
dedicated in the researchers works, whom interesting in the social affairs, and that whom
work in the medicine field as scientists.
So the child is the future man and must be in wright body construction that need to great
care and interest to make him wright mind through capability of performing anything support
to him.
In our research we deal with the main factors in which lead to infect the child by the
creative malfunction, like the environmental and m
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreAn edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show MoreThe present study investigates the use of intensifiers as linguisticdevices employed by Charles Dickens in Hard Times. For ease of analysis, the data are obtained by a rigorous observation of spontaneously occurring intensifiers in the text. The study aims at exploring the pragmatic functions and aesthetic impact of using intensifiers in Hard Times.The current study is mainly descriptive analytical and is based on analyzing and interpreting the use of intensifiers in terms ofHolmes (1984) andCacchiani’smodel (2009). From the findings, the novelist overuses intensifiers to the extent that 280 intensifiers are used in the text. These intensifiers(218) are undistinguished
... Show MoreAbstract
This study talks about a wonderful Qur'anic style. relates to one of the methods used in it. And it's the rhetorical style: ''Affirmative say''. It is useful in arguing with the opponent, nullifying his reasoning, and proving the opposite meaning of the opponent. The study will be conducted from a Qur'anic perspective based on the study of examples of it, and partly in interpretive treatment through the book of editing and enlightenment of Taher Ibn Ashour, known for his art in matters of rhetoric and methods of controversy. This is with the rooting of this issue, and the relationship of industrial sciences to it as a Qur'anic style.
Keywords: ''Affirmative say, style, Qur'anic rhetoric, Arabic rhetoric, Co
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Praise be to God, Lord of the worlds, and prayers and peace be upon the best of the messengers, Muhammad, and all his family and companions. And after:
For when I had the pleasure of looking at the chapters of the Noble Qur’an, and its evident signs, my view fell on one of its brightest verses, and it is the Almighty saying: ﭽﯜ ﯝ ﯞ ﯟ ﯠ ﯡ ﯢ ﯣ ﯤ ﯥ ﯦ ﯧ ﯨﭼ (). The tag: (God’s Greatness in Creating a Hoopoe). The research methodology required that I divide it into four sections:
The first topic: an overview of birds.
The second topic: the characteristics and characteristics of hoopoe.
The third topic: the logic of the bird.
The fourth topic: Praise the bird.
This has relied in my research on