This study numerically intends to evaluate the effects of arc-shaped fins on the melting capability of a triplex-tube confinement system filled with phase-change materials (PCMs). In contrast to situations with no fins, where PCM exhibits relatively poor heat response, in this study, the thermal performance is modified using novel arc-shaped fins with various circular angles and orientations compared with traditional rectangular fins. Several inline and staggered layouts are also assessed to maximize the fin’s efficacy. The effect of the nearby natural convection is further investigated by adding a fin to the bottom of the heat-storage domain. Additionally, the Reynolds number and temperature of the heat-transfer fluid (HTF) are evaluated. The outcomes showed that the arc-shaped fins could greatly enhance the PCMs’ melting rate and the associated heat-storage properties. The melting rate is 17% and 93.1% greater for the case fitted with an inline distribution of the fins with a circular angle of 90° and an upward direction, respectively, than the cases with uniform rectangular fins and no fins, which corresponded to the shorter melting time of 14.5% and 50.4%. For the case with arc-shaped fins with a 90° circular angle, the melting rate increases by 9% using a staggered distribution. Compared to the staggered fin distribution, adding an extra fin to the bottom of the domain indicates adverse effects. The charging time reduces by 5.8% and 9.2% when the Reynolds number (Re) rises from 500 to 1000 and 1500, respectively, while the heat-storage rate increases by 6.3% and 10.3%. When the fluid inlet temperature is 55°C or 50°C, compared with 45°C, the overall charging time increases by 98% and 47%, respectively.
Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
Background: Dialysis is in common use to treat patients
with end stage renal failure .However longstanding dialysis
harboring some cellular changes in various body fluids.
This study was conducted in order to detect these changes
in urine.
Objective: The study was conducted to detect cellular
changes in urine of patients with longstanding dialysis.
Method: Fifty-three urine samples were examined
cytologically obtained from patients with longstanding
dialysis during 6 months period. Freshly voided midstream
urine samples were taken . Samples were centrifuged and 2
to 3 drops of sediments were smeared on 2 glass slides and
fixed in 95% ethyl alcohol then stained with Hand E stain
to be evaluated.
R
The non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration. chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology ha
... Show MoreA new panel method had been developed to account for unsteady nonlinear subsonic flow. Two boundary conditions were used to solve the potential flow about complex configurations of airplanes. Dirichlet boundary condition and Neumann formulation are frequently applied to the configurations that have thick and thin surfaces respectively. Mixed boundary conditions were used in the present work to simulate the connection between thick fuselage and thin wing surfaces. The matrix of linear equations was solved every time step in a marching technique with Kelvin's theorem for the unsteady wake modeling. To make the method closer to the experimental data, a Nonlinear stripe theory which is based on a two-dimensional viscous-inviscid interac
... Show MoreIn this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets
In this paper, a discretization of a three-dimensional fractional-order prey-predator model has been investigated with Holling type III functional response. All its fixed points are determined; also, their local stability is investigated. We extend the discretized system to an optimal control problem to get the optimal harvesting amount. For this, the discrete-time Pontryagin’s maximum principle is used. Finally, numerical simulation results are given to confirm the theoretical outputs as well as to solve the optimality problem.
In this paper, new concepts which are called: left derivations and generalized left derivations in nearrings have been defined. Furthermore, the commutativity of the 3-prime near-ring which involves some
algebraic identities on generalized left derivation has been studied.
In this paper we generalize some of the results due to Bell and Mason on a near-ring N admitting a derivation D , and we will show that the body of evidence on prime near-rings with derivations have the behavior of the ring. Our purpose in this work is to explore further this ring like behavior. Also, we show that under appropriate additional hypothesis a near-ring must be a commutative ring.