The investigation of natural convection in an annular space between two concentric cylinders partially filled with metal foam is introduced numerically. The metal foam is inserted with a new suggested design that includes the distribution of metal foam in the annular space, not only in the redial direction, but also with the angular direction. Temperatures of inner and outer cylinders are maintained at constant value in which inner cylinder temperature is higher than the outer one. Naiver Stokes equation with Boussinesq approximation is used for fluid regime while Brinkman-Forchheimer Darcy model used for metal foam. In addition, the local thermal equilibrium condition in the energy equation of the porous media is presumed to be applicable for the present investigation. CFD ANSYS FLUENT software package (version 18.2) is used as a solver to this problem. Various parameters are examined; Rayleigh number, Darcy number, and thermal conductivity ratio to study the effect of them on fluid flow and heat transfer inside the annuli space in the suggested design of metal foam layer. current model is compared with the available published results and good agreement is noticed. Results showed that as Rayleigh number increases the dominated of convection mode increases and Nusselt increases. Also, Nusselt is larger at the higher Darcy and thermal conductivity ratio. It was found that at Rayleigh of 106 and thermal conductivity ratio of 104 Nusselt reach its higher value which is 6.69 for Darcy of 0.1 and 6.77 for Darcy of 0.001. A comparison between this design and the traditional design was established for Darcy 0.001 and thermal conductivity ratio 102, and its showed a good enhancement in Nusselt number and the greatest enhancement percentage was 44% at Rayleigh equal 5*104 while the lowest percentage is 6% for Rayleigh equal106.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This study revealed the efficiency of Bacillus subtilisin degrading two textile dyes (disperse red and disperse yellow), the rates of red dye removal when measured after 24, 48, 72 and 96 hours for the concentrations of 50 ppm were 51.67, 67.56, 84.67 and 95.33%, for the concentration 150 ppm were 41.67, 62.67, 80.67 and 89.67%, while for the concentration 300 ppm were 25.67, 42.67, 71.67 and 84.33%. The results of yellow dye removal showed that the concentration of 50 ppm were 49.67, 65.33, 83.33 and 92.67%, for the concentration of 150 ppm were 38.33, 60.33, 77.33 and 87.33%, and for the concentration, 300 ppm were 24, 36.67, 68.33 and 81.67%, when measured after 24, 48, 72 and 96 hours. Results recorded a slight decrease in pH valu
... Show MoreThe dynamics of a single condensing two-phase bubble of two different dispersed-continuous systems were studied. The systems were, CCl4 - water and CCl4 - 100% glycerol. Cinephotography was used to determine the change in height, diameter and time. These results were used to determine the experimental rise velocity of the bubble, which was compared with a theoretical one based on some equations used. It was found that the velocity of the first system remained almost constant, while it decreased gradually for the second system.
In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-
... Show MoreIn this paper, the exact solutions of the Schlömilch’s integral equation and its linear and non-linear generalized formulas with application are solved by using two efficient iterative methods. The Schlömilch’s integral equations have many applications in atmospheric, terrestrial physics and ionospheric problems. They describe the density profile of electrons from the ionospheric for awry occurrence of the quasi-transverse approximations. The paper aims to discuss these issues.
First, the authors apply a regularization meth
In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent r
... Show MoreOne of the most important problems in the statistical inference is estimating parameters and Reliability parameter and also interval estimation , and testing hypothesis . estimating two parameters of exponential distribution and also reliability parameter in a stress-strength model.
This parameter deals with estimating the scale parameter and the Location parameter µ , of two exponential distribution ,using moments estimator and maximum likelihood estimator , also we estimate the parameter R=pr(x>y), where x,y are two- parameter independent exponential random variables .
Statistical properties of this distribution and its properti
... Show MoreThis study, establishes two stochastic monotonicity results concerning the run length of an upper one –sided Exponentially Weighted Moving Average (EWMA) control charts, based on the logarithm of the sample variance, for monitoring a process standard deviation, these properties cast interesting light on the control chart performance, and their extension to other one –sided EWMA control charts.
Direct measurements of drag force on two interacting particles arranged in the longitudinal direction for particle Reynolds numbers varying from J O to 103 are conducted using a micro-force measurement system. The effect of the interparticle distance and Reynolds number on the drag forces is examined. An empirical equation is obtained to describe the effect of the interparticle distance (l/d) on the dimensionless drag.