This study reports on natural convection heat transfer in a square enclosure of length (L=20 cm) with a saturated porous medium (solid glass beads) having same fluid (air) at lower horizontal layer and free air fill in the rest of the cavity's space. The experimental work has been performed under the effects of heating from bottom by constant heat flux q=150,300,450,600 W/m2 for four porous layers thickness Hp (2.5,5,7.5,1) cm and three heaters length δ(20,14,7) cm. The top enclosure wall was good insulated and the two side walls were symmetrically cooled at constant temperature. Four layers of porous media with small porosity, Rayleigh number range (60.354 - 241.41) and (Da) 3.025x10-8 has been investigated. The obtained data of temperature from testing rig are used to extract the temperature distribution, local Nusselt number and average Nusselt number. Moreover, a comparison between the numerical result of the same problem published recently and present experimental results has been executed and discussed. It is evinced that; the heat transfer and fluid flow are affected by thickness of porous layer and be maximum at porous layer thickness (0.25L) with larger heater length(20cm) and heat flux (q= 600 Watt/m2) which is approximately (180%) for the average Nu when compared with (Hp=0.75L). Also, the effect of the increasing in heater length (δ) on the averaged heat transfer enhancement is more pronounced for large heater size and 25% of average enhancement is achieved for (δ=20cm) compared to (δ=7cm). However, the greater temperature distribution is found at Hp=2.5cm and 5cm at bottom and first quarter of the cavity (heater surface height Y=0 cm and Y=5 cm) respectively and minimum temperature at top (insulation wall Y=20 cm). Nearly, same shape for heat transfer for different case with clearly difference at small heater (δ=7cm).
This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show MoreThere is a growing need for up-to-date data for rapid decision making in the modern digital age. Recently, the need for high-resolution topographic maps is highly demanding by most mapping clients. With the maturing automatic structure from mobile and multi-view stereoscopy software, small organizations and individuals now have the ability to make their own surveys based on mobile mapping devices. This study looks at how feasible using low-cost Unmanned Aerial Vehicle (UAV) as a mobile mapping device for photogrammetric topographical surveys. It is showing the impact of different UAV flight settings and parameters on the accuracy of mapping products. An automatic scenario for photogra
Understanding energy metabolism and intracellular energy transmission requires knowledge of the function and structure of the mitochondria. Issues with mitochondrial morphology, structure, and function are the most prevalent symptoms. They can damage organs such as the heart, brain, and muscle due to a variety of factors, such as oxidative damage, incorrect metabolism of energy, or genetic conditions. The control of cell metabolism and physiology depends on functional connections between mitochondrial and biological surroundings. Therefore, it is essential to research mitochondria in situ or in vivo without isolating them from their surrounding biological environment. Finding and spotting abnormal alterations in mitochondria is the
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThis study produces an image of theoretical and experimental case of high loading stumbling condition for hip prosthesis. Model had been studied namely Charnley. This model was modeled with finite element method by using ANSYS software, the effect of changing the design parameters (head diameter, neck length, neck ratio, stem length) on Charnley design, for stumbling case as impact load where the load reach to (8.7* body weight) for impact duration of 0.005sec.An experimental rig had been constructed to test the hip model, this rig consist of a wood box with a smooth sliding shaft where a load of 1 pound is dropped from three heights.
The strain produced by this impact is measured by using rosette strain gauge connected to Wheatstone
The aim of the research is to identify the educational and psychological effects of the positive and negative aspects of using social networking websites. The researcher administered a number of questions to (250) users of different types of social networking websites. He analyzed his research results and obtained a number of results. The research has reached a number of recommendations and suggestion: Regulating the use of social media. Monitoring the parents of the sites used by children in a way that they do not feel they are observers. It is necessary to devote an hour daily to show the importance of real social life for children other than using social media. It is necessary to show the importance of choosing friends who hav
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon the most honorable of God’s creation, Muhammad bin Abdullah, the illiterate Arab prophet, the faithful, and his family and companions.
And yet ...
The realistic view is that Islamic jurisprudence is not exaggerated in the judgment of compensation, so it is judged for everything that has been lost by the victim of a profit or his loss, but he takes into account the bearing of the guarantee between profit and loss or the principle on which the theory of bearing liability is found, and it is clear through research that Islam The principle of respecting money, souls and rights is considered a public order, but it may exclude some ca
... Show MoreIn the current research, we investigated the absorption spectrum for R590 and C480 dyes in ethanol solvent for different dye solution concentrations of 10-4, 10-5 and 10-6M. These dyes have been prepared and studied before and after gamma irradiation (first, second ionization) using cesium-137 source with absorbed doses of 18.36 Gy (time exposure of 10 days) and 73.44 Gy (with time exposure of 40 days). We noticed that the absorption intensity was decreased with decreasing concentration, before gamma irradiation while the absorption spectrum peak shifted towards the short wavelength (blue shift). It was also found that the intensity of absorption spectrum increased and shifted the absorption spectrum peak towards the long wavelength (red
... Show More