Phase-change materials (PCMs) have a remarkable potential for use as efficient energy storage means. However, their poor response rates during energy storage and retrieval modes require the use of heat transfer enhancers to combat these limitations. This research marks the first attempt to explore the potential of dimple-shaped fins for the enhancement of PCM thermal response in a shell-and-tube casing. Fin arrays with different dimensions and diverse distribution patterns were designed and studied to assess the effect of modifying the fin geometric parameters and distribution patterns in various spatial zones of the physical domain. The results indicate that increasing the number of dimple fins in the range of 8–32 results in faster heat storage rates by up to 8.7% faster than they would be without the dimple fins. Further improvements of approximately 1.4, 1.2, 1.1, and 1.0% can be obtained by optimizing the position of the first fin section, the spacing between other fin sections, the fin spacing based on the aromatic algorithm, and the use of the staggered fin distribution. The heat storage rate is improved by almost 12% for the best case compared with that of the no-fin case.
This paper deals with constructing mixed probability distribution from mixing exponential
The increasing efficiency of the telecommunications network in the city contributes to the increase in spatial interaction between activities (to influence and mutual influence) This study is based on the idea that the upgrading of telephone services provided to citizens are done exclusively through the growth and development of all levels of the service using advanced technologies to know the problems and appropriate solutions in short time and less cost. Thus, crystallized the objectives of the study which was built for the importance of GIS in the planning of services in general, and infrastructure services, in particular, including telephone services, which is represent a point of contact between individuals on the one hand a
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreBackground: Rehabilitation of the carious tooth to establish tooth structure integrity required cavity design that show a benign stress distribution. The aim of this study was to investigate the influence of the cavity position on the stress values in the reamining tooth structure restored with amalgam or resin composite. Materials and methods: Seven 2-D models of maxillary first premolar include class I cavity design was prepared, one sound tooth (A) 3 composite (B1, B2, and B3) and 3 amalgam (C1, C2, and C3). In design (BI and C1) the cavity position is in the mid distance between bacc-lingual cusp tip, design (B2 and C2) and (B3 and C3) shifted toward the buccal cusp and the lingual cusp for 0.5 mm respectively. One hundred N vertical
... Show MoreHumanoids or bipedal robots are other kinds of robots that have legs. The balance of humanoids is the general problem in these types when the other in the support phase and the leg in the swing phase. In this work, the walking pattern generation is studied by MATLAB for two types of degrees of freedom, 10 and 17 degrees of freedom. Besides, the KHR-2HV simulation model is used to simulate the experimental results by Webots. Similarly, Arduino and LOBOT LSC microcontrollers are used to program the bipedal robot. After the several methods for programming the bipedal robot by Arduino microcontroller, LOBOT LSC-32 driver model is the better than PCA 96685 Driver-16 channel servo driver for programming the bipedal walking rob
... Show More?Natural Occurrence of aflatoxin Bi and B2 was investigated monthly in paddy rice stored for duration of six months. Aflatoxin B| was detected at the beginning of storage. The concentration of aflatoxin Bi in paddy and polished rice was found to be (0.3 and ()) ppb respectively while aflatoxin B2 W'as not detected in both paddy and polished rice afler six months of storage, concentration of aflatoxin Bi ‘ ’ ' reached 3 ppb in paddy rice and 0.9 ppb in polished rice, while the study proved that the concentration of aflatoxin in paddy rice was higher than polished rice as a result of processing which reduce the toxin
The problem of reconstruction of a timewise dependent coefficient and free boundary at once in a nonlocal diffusion equation under Stefan and heat Flux as nonlocal overdetermination conditions have been considered. A Crank–Nicolson finite difference method (FDM) combined with the trapezoidal rule quadrature is used for the direct problem. While the inverse problem is reformulated as a nonlinear regularized least-square optimization problem with simple bound and solved efficiently by MATLAB subroutine lsqnonlin from the optimization toolbox. Since the problem under investigation is generally ill-posed, a small error in the input data leads to a huge error in the output, then Tikhonov’s regularization technique is app
... Show MoreIn paper, we study the impact of the rotationn inclined magnetic felid and inclined symmetric channel with slip condition on peristaltic transport using incompressible non-Newtonian fluid. Slip conditions for the concentration and heat transfer are considered. We use the conditions on the fluid, namely infinite wavelength and low - Reynolds number to simplify the governed equations that described - motion flow, energy and concentration. These equations ofroblem are solved by the perturbation technique and restricted the number of Bingham to a small value to find the final expression of the stream function. The Bingham number, Brinkman number, Soret number, Dufour number, temperature, Hartman number and other parameters are teste
... Show MoreThis study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show More