Inherent fluctuations in the availability of energy from renewables, particularly solar, remain a substantial impediment to their widespread deployment worldwide. Employing phase-change materials (PCMs) as media, saving energy for later consumption, offers a promising solution for overcoming the problem. However, the heat conductivities of most PCMs are limited, which severely limits the energy storage potential of these materials. This study suggests employing circular fins with staggered distribution to achieve improved thermal response rates of PCM in a vertical triple-tube heat exchanger involving two opposite flow streams of the heat-transfer fluid (HTF). Since heat diffusion is not the same at various portions of the PCM unit, different fin configurations, fin dimensions and HTF flow boundary conditions were explored using computational studies of melting in the PCM triple-tube system. Staggered configuration of fin distribution resulted in significant increases in the rates of PCM melting. The results indicate that the melting rate and heat charging rate could be increased by 37.2 and 59.1%, respectively, in the case of staggered distribution. Furthermore, the use of lengthy fins with smaller thickness in the vertical direction of the storage unit resulted in a better positive role of natural convection; thus, faster melting rates were achieved. With fin dimensions of 0.666 mm × 15 mm, the melting rate was found to be increased by 23.6%, when compared to the base case of 2 mm × 5 mm. Finally, it was confirmed that the values of the Reynolds number and inlet temperatures of the HTF had a significant impact on melting time savings when circular fins of staggered distribution were included.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThis research deals with the nature of the Turkish attitude towards the events of the Arab Spring which the Arab region witnessed recently, as this attitude is characterized by hesitation and utter confusion about those events at its beginning. However, the development of events and the consequent repercussions led the Turkish decision makers of the foreign policy to reconsider their attitude towards those events for political, economic, cultural and social motives.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThe report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show MoreHumor is an interesting phenomenon that has been studied widely, yet it is considered a universal trait that cannot be an old subject for a study. This study is conducted to investigate humor from a universal pragmatic lens in a stand-up comedy show, namely, You Wanna Hear Something Crazy?. It aims to study humor as a coin with two sides, the production side and the understanding side. To achieve the aim of the study, the researchers use an eclectic contains Grice’s CP model (1975) and Habermas’s UP model (1979, 1984, 1987, 1998). The study has noted that while using the observance and the non-observance of the cooperative maxims to produce humor, the universal validity claims of truth, sincerity, and normative rightness for rea
... Show MoreThe media, especially the satellite channels in our time, are one of the most important pillars of daily life, public and private, for society and people, and are considered by sociologists and sociologists as one of the most important factors of social upbringing and the most important, as a result of the technological and technological development of the media as well as increasing their numbers and vertical and horizontal expansion locally, As well as entering into the lives of individuals and people and leading them to important sites within their interests and preferences, not to mention the long time spent exposure to those media and benefit from the programs offered or broadcast. , The problem of this research is that there is a l
... Show MoreThe study aims at investigating the quality of internal auditing and its impact on nature, timing, and procedures of external audit, based on international auditing standards, in particular ISA (610). The standard ISA (610) requires the external auditors to assess independence, the scope of internal audit unit, competence, and due professional care of internal auditors as indicators that reflect the quality of internal audit performance before deciding to rely on internal auditors.
The sample of this study consisted of external auditors in Iraqi Solidary Companies for Auditing. A questionnaire was distributed to them via e-mail
... Show MoreWhen searching for an answer to the following question: What are the reasons for the reluctance of female physical education teachers in secondary schools to referee sports competitions according to the variable of years of service? It was found that the research aimed to reveal the differences between the opinions of the research sample of physical education teachers in secondary schools (girls) about refereeing sports competitions according to the variable of years of service. To achieve the research goal, it is assumed that there are significant differences between the average opinions of the research sample of female teachers and their reluctance and the reasons for the differences in the practice of refereeing sports competitions accor
... Show More