Simultaneous and consecutive charging and discharging of a PCM-based domestic air heater with metal foam
...Show More Authors
A pseudo-slug flow is a type of intermittent flow characterized by short, frothy, chaotic slugs that have a structure velocity lower than the mixture velocity and are not fully formed. It is essential to accurately estimate the transition from conventional slug (SL) flow to pseudo-slug (PSL) flow, and from SL to churn (CH), by precisely predicting the pressure losses. Recent research has showed that PSL and CH flows comprise a significant portion of the conventional flow pattern maps. This is particularly true in wellbores and pipelines with highly deviated large-diameter gas-condensate wellbores and pipelines. Several theoretical and experimental works studied the behavior of PSL and CH flows; however, few models have been suggested to pre
... Show MoreABSTRACT. The reaction between benzil and hexamethylenediamine formed a new ligand [L], [(1Z,3Z)-2,3-diphenyl-5,6,7,8,9,10-hexahydro-1,4-diazecine], of the type [N2], was synthesized by the condensation reaction through Schiff base reaction between benzil and hexamethylenediamine. The new Schiff base ligand reacts with Mnп, Niп and Coп metal ions to give the complexes with the general formula: [M(L)Cl2]. The elemental investigations have been used to analyze the ligand and its complexes by CHN, FT-IR, UV-Vis, TLC, mass spectrum, melting point with the study of biological activity to the formed compounds. From the data obtained, the proposed molecular structure adopts square planar structure about the metal ions. The study reveals
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreBinary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe education, especially higher education, is an essentially factor in the progress of any society, if we consider the higher education, represents the top of the education`s pyramid which take part in developing the human resources and provide the human staff to raise the productive efficiency, and improve the social , economic level
In order to face the increasing importance of higher education, great capabilities and expenditures must be available in a continous way, such expe
... Show More