Utilizing phase change materials in thermal energy storage systems is commonly considered as an alternative solution for the effective use of energy. This study presents numerical simulations of the charging process for a multitube latent heat thermal energy storage system. A thermal energy storage model, consisting of five tubes of heat transfer fluids, was investigated using Rubitherm phase change material (RT35) as the. The locations of the tubes were optimized by applying the Taguchi method. The thermal behavior of the unit was evaluated by considering the liquid fraction graphs, streamlines, and isotherm contours. The numerical model was first verified compared with existed experimental data from the literature. The outcomes revealed that based on the Taguchi method, the first row of the heat transfer fluid tubes should be located at the lowest possible area while the other tubes should be spread consistently in the enclosure. The charging rate changed by 76% when varying the locations of the tubes in the enclosure to the optimum point. The development of streamlines and free-convection flow circulation was found to impact the system design significantly. The Taguchi method could efficiently assign the optimum design of the system with few simulations. Accordingly, this approach gives the impression of the future design of energy storage systems.
Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreThe aim of this paper is to analyzed unsteady heat transfer for magnetohydrodynamic (MHD) flow of a second grade fluid in a channel with porous medium. The equations which was used to describe the flow are the momentum and energy, these equations were written to get thier non dimentional form. Homotopy analysis method (HAM) is employed to obtain a semi-analytical solutions for velocity and heat transfer fields. The effect of each dimensionless parameter upon the velocity and temperature distributions is analyzed and shown graphically by using MATHEMATICA package.
In the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreThe present study deals with successive stages of productive
operations happened to produce a production within each stage befo re it moves to the next one. ll cou ld be deduced that this study is an extension to what bas been mentioned in (1 ) .ln (I), the optimum distribution of di!Terent jobs of workers and machines in the productive operations has been st ud ied whi le the study invol ves the optimum schedule for the succession of these operations presuming that thay have already been distributed on machines and workers (2).A mathematical form has been put for this study to define the "Object.ive Function "
... Show MoreTheoretical and experimental investigations of the transient heat transfer parameters of constant heat flux source subjected to water flowing in the downward direction in closed channel are conducted. The power increase transient is ensured by step change increase in the heat source power. The theoretical investigation involved a mathematical modeling for axially symmetric, simultaneously developing laminar water flow in a vertical annulus. The mathematical model is based on one dimensional downward flow. The boundary conditions of the studied case are based on adiabatic outer wall, while the inner wall is subjected to a constant heat flux. The heat & mass balance equation derived for specified element of bulk water within the annulu
... Show MoreInvestigating the thermal and electrical gains and efficiencies influence the designed photovoltaic thermal hybrid collector (PVT) under different weather conditions. The designed system was manufactured by attaching a fabricated cooling system made of serpentine tubes to a single PV panel and connecting it to an automatic controlling system for measuring, monitoring, and simultaneously collecting the required data. A removable glass cover had been used to study the effects of glazed and unglazed PVT panel situations. The research was conducted in February (winter) and July (summer), and March for daily solar radiation effects on efficiencies. The results indicated that electrical and thermal gains increased by the incre
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreA numerical investigation has been performed to study the effect of eccentricity on unsteady state, laminar aiding mixed convection in a horizontal concentric and eccentric cylindrical annulus. The outer cylinder was kept at a constant temperature
while the inner cylinder was heated with constant heat flux. The study involved numerical solution of transient momentum (Navier-Stokes) and energy equation using finite difference method (FDM), where the body fitted coordinate system (BFC) was
used to generate the grid mesh for computational plane. The governing equations were transformed to the vorticity-stream function formula as for momentum equations and to the temperature and stream function for energy equation.
A computer progra