The investigation of natural convection in an annular space between two concentric cylinders partially filled with metal foam is introduced numerically. The metal foam is inserted with a new suggested design that includes the distribution of metal foam in the annular space, not only in the redial direction, but also with the angular direction. Temperatures of inner and outer cylinders are maintained at constant value in which inner cylinder temperature is higher than the outer one. Naiver Stokes equation with Boussinesq approximation is used for fluid regime while Brinkman-Forchheimer Darcy model used for metal foam. In addition, the local thermal equilibrium condition in the energy equation of the porous media is presumed to be applicable for the present investigation. CFD ANSYS FLUENT software package (version 18.2) is used as a solver to this problem. Various parameters are examined; Rayleigh number, Darcy number, and thermal conductivity ratio to study the effect of them on fluid flow and heat transfer inside the annuli space in the suggested design of metal foam layer. current model is compared with the available published results and good agreement is noticed. Results showed that as Rayleigh number increases the dominated of convection mode increases and Nusselt increases. Also, Nusselt is larger at the higher Darcy and thermal conductivity ratio. It was found that at Rayleigh of 106 and thermal conductivity ratio of 104 Nusselt reach its higher value which is 6.69 for Darcy of 0.1 and 6.77 for Darcy of 0.001. A comparison between this design and the traditional design was established for Darcy 0.001 and thermal conductivity ratio 102, and its showed a good enhancement in Nusselt number and the greatest enhancement percentage was 44% at Rayleigh equal 5*104 while the lowest percentage is 6% for Rayleigh equal106.
This work comprises the synthesis of new phenoxazine derivatives containing N-substituted phenoxazine starting from phenoxazine (1). Synthesis of ethyl acetate phenoxazine (2) through the reaction of phenoxazine with ethylchloroacetate, which reacted with hydrazine hydrate to give 10-aceto hydrazide phenoxazine (3), then reacted with formic acid to give 10-[N-formyl acetohydrazide] phenoxazine (4). Reaction of compound (4) with phosphorous pentaoxide or phosphorus pentasulphide to gave 10-[N-methylene-1,3,4-oxadiazole] phenoxazine (5) and 10-[N-methylene-1,3,4-thiadiazole] phenoxazine (6).
In contrast to the classical antibacterial sulfa drugs that are unsubstituted or monosubstituted, our newly synthesized analogs were designed to obtain sulfonamide moiety containing disubstituted hetero nitrogen atom. These compounds were formed successfully by chlorosulfonation of acetanilide and the product was treated with different cyclic amines and finally amide hydrolysis was necessary to get agents that were analyzed for IR, UV, CHN, melting points and solubility. At last, we studied their antibacterial activity on certain types of bacteria and we noticed the inactivity due to possible steric factor. Principly, this means these products have no inhibiting action against the used microbes.
The present work involved synthesis of new thiozolidinone derivatives,These derivatives could be divided into three type of compounds; quinolin-2-one[V]a,b ,Schiff bases[VI]a,b and imide compounds[VII]a-d. The reaction p-Hydroxyacetophenone with thiosemicarbazide led to formation thiosemicarbazon compound [II], the reacted of thiosemicarbazone with chloro acetic acid in CH3CO2Na led to yield 4- thiazelidinone compound[III] in addition, thiosemicarbazide was POCl3 to [III] give [IV] compound used intermediates to synthesis new compounds of reacted with two type of coumarin in glacial acetic acid to give quinolin-2-one[V]a,b, The later compound refluxing with different benzaldehyde in dry benzene and glacial acetic acid give Schiff bases[VI]a
... Show MoreThis paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreThis paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N
... Show MoreKlebsiella pneumoniae is among the most frequent microorganisms isolated from infections of burn wounds. This cross-sectional study aimed to investigate the distribution of multi-drug resistant (MDR) K. pneumoniae in two burn hospitals and the antibiotic resistance profile in different burn regions of the same patient. It was performed in two hospitals (Al-Zahraa and Al-Karama) in Al-Kut, Iraq, between January and May 2022. Totally, 100 burn swabs were collected from 40 patients of both genders suffering from burn wound infections, with ages ranging between 3 and 50 years. Klebsiella pneumoniae were isolated and identified using conventional methods followed by VITEK®2 system and confirmed via polymerase chain reaction targeting t
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More