This work evaluates the influence of combining twisted fins in a triple-tube heat exchanger utilised for latent heat thermal energy storage (LHTES) in three-dimensional numerical simulation and comparing the outcome with the cases of the straight fins and no fins. The phase change material (PCM) is in the annulus between the inner and the outer tube, these tubes include a cold fluid that flows in the counter current path, to solidify the PCM and release the heat storage energy. The performance of the unit was assessed based on the liquid fraction and temperature profiles as well as solidification and the energy storage rate. This study aims to find suitable and efficient fins number and the optimum values of the Re and the inlet temperature of the heat transfer fluid. The outcomes stated the benefits of using twisted fins related to those cases of straight fins and the no-fins. The impact of multi-twisted fins was also considered to detect their influences on the solidification process. The outcomes reveal that the operation of four twisted fins decreased the solidification time by 12.7% and 22.9% compared with four straight fins and the no-fins cases, respectively. Four twisted fins improved the discharging rate by 12.4% and 22.8% compared with the cases of four straight fins and no-fins, respectively. Besides, by reducing the fins’ number from six to four and two, the solidification time reduces by 11.9% and 25.6%, respectively. The current work shows the impacts of innovative designs of fins in the LHTES to produce novel inventions for commercialisation, besides saving the power grid.
The aim of this paper is to present a method for solving third order ordinary differential equations with two point boundary condition , we propose two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, many examples are presented to demonstrate the applicability, accuracy and efficiency of the method by compared with conventional method .
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreIn this paper, the method of estimating the variation of Zenith Path Delay (ZPD) estimation method will be illustrate and evaluate using Real Time Kinematic Differential Global Positioning System (RTK-DGPS). The GPS provides a relative method to remotely sense atmospheric water vapor in any weather condition. The GPS signal delay in the atmosphere can be expressed as ZPD. In order to evaluate the results, four points had been chosen in the university of Baghdad campus to be rover ones, with a fixed Base point. For each rover position a 155 day of coordinates measurements was collected to overcome the results. Many models and mathematic calculations were used to extract the ZPD using the Matlab environment. The result shows that the ZPD valu
... Show More<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt& pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi
... Show More
