Due to the potential cost saving and minimal temperature stratification, the energy storage based on phase-change materials (PCMs) can be a reliable approach for decoupling energy demand from immediate supply availability. However, due to their high heat resistance, these materials necessitate the introduction of enhancing additives, such as expanded surfaces and fins, to enable their deployment in more widespread thermal and energy storage applications. This study reports on how circular fins with staggered distribution and variable orientations can be employed for addressing the low thermal response rates in a PCM (Paraffin RT-35) triple-tube heat exchanger consisting of two heat-transfer fluids flow in opposites directions through the inner and the outer tubes. Various configurations, dimensions, and orientations of the circular fins at different flow conditions of the heat-transfer fluid were numerically examined and optimized using an experimentally validated computational fluid-dynamic model. The results show that the melting rate, compared with the base case of finless, can be improved by 88% and the heat charging rate by 34%, when the fin orientation is downward–upward along the left side and the right side of the PCM shell. The results also show that there is a benefit if longer fins with smaller thicknesses are adopted in the vertical direction of the storage unit. This benefit helps natural convection to play a greater role, resulting in higher melting rates. Changing the fins’ dimensions from (thickness × length) 2 × 7.071 mm2 to 0.55 × 25.76 mm2 decreases the melting time by 22% and increases the heat charging rate by 9.6%. This study has also confirmed the importance of selecting the suitable values of Reynolds numbers and the inlet temperatures of the heat-transfer fluid for optimizing the melting enhancement potential of circular fins with downward–upward fin orientations.
With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreThis study seeks to highlights on the behavioral approach in organization theory as modern and effective entrance in constructing this theory and reflection extent on the behavior of both the product and the information user (accountant and financial information).
The study also focus on behavioral approach role in consolidating accounting concepts through making harmony between them so that the accountant can influence the user behavior with the concepts and principles of accounting in an effort to provide quality characteristic of accounting information produced by him in consistent with his behavior and information user and its impact on the decision making process by the latter.
... Show MoreIn this study, the flexural performance of a new composite beam–slab system filled with concrete material was investigated, where this system was mainly prepared from lightweight cold-formed steel sections of a beam and a deck slab for carrying heavy floor loads as another concept of a conventional composite system with a lower cost impact. For this purpose, seven samples of a profile steel sheet–dry board deck slab (PSSDB/PDS) carried by a steel cold-formed C-purlins beam (CB) were prepared and named “composite CBPDS specimen”, which were tested under a static bending load. Specifically, the effects of the profile steel sheet (PSS) direction (parallel or perpendicular to the span of the specimen) using different C-purlins c
... Show MoreA prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc
... Show MoreMassive multiple-input multiple-output (massive-MIMO) is a promising technology for next generation wireless communications systems due to its capability to increase the data rate and meet the enormous ongoing data traffic explosion. However, in non-reciprocal channels, such as those encountered in frequency division duplex (FDD) systems, channel state information (CSI) estimation using downlink (DL) training sequence is to date very challenging issue, especially when the channel exhibits a shorter coherence time. In particular, the availability of sufficiently accurate CSI at the base transceiver station (BTS) allows an efficient precoding design in the DL transmission to be achieved, and thus, reliable communication systems can be obtaine
... Show MoreTo show the impact of 790-805 nm diode laser irradiations on wound healing as a supplementary treatment in women underwent episiotomies, and to assess the laser parameters that were used .Material and methods: Eighteen female patients were included in this study; all of them underwent mediolateral episiotomy. Ten patients received laser therapy- diode laser (K Laser) (790-805) nm in CW mode of operation (and eight patients were the control group. Spot size of 8mm, time for exposure for each spot was 30 seconds. The power used was 0.6 W .The power density for each spot of treatment was 1.19 W/cm2 per session (non contact mode of application of laser therapy).The group studied received 2 sessions of laser radiation, day 4, and day 8 after
... Show MoreDifferent parameters of double pipe helical coil were investigation experimentally. Four coils were used; three with a curvature ratio (0.037, 0.031, and 0.028) and 11mm diameter of the inner tube while the fourth with 0.033 curvature ratio and 13 mm diameter of the inner tube. The hot water flow in the inner tube whereas the cold water flows in the annulus. The inlet temperatures of hot and cold water are 50 0C and 18 0C respectively. The inner mass flow rate ranges from 0.0167 to 0.0583 kg/s. The results show the Nusselt number increase with increase curvature ratio. The Nusselt number of the coil with 0.037 curvature ratio increases by approximately 12.3 % as compare with 0.028 curvature ratio. The results also r
... Show MoreIn the field of civil engineering, the adoption and use of Falling Weight Deflectometers (FWDs) is seen as a response to the ever changing and technology-driven world. Specifically, FWDs refer to devices that aid in evaluating the physical properties of a pavement. This paper has assessed the concepts of data processing, storage, and analysis via FWDs. The device has been found to play an important role in enabling the operators and field practitioners to understand vertical deflection responses upon subjecting pavements to impulse loads. In turn, the resultant data and its analysis outcomes lead to the backcalculation of the state of stiffness, with initial analyses of the deflection bowl occurring in conjunction with the measured or assum
... Show MoreA simple straightforward mathematical method has been developed to cluster grid nodes on a boundary segment of an arbitrary geometry that can be fitted by a relevant polynomial. The method of solution is accomplished in two steps. At the first step, the length of the boundary segment is evaluated by using the mean value theorem, then grids are clustered as desired, using relevant linear clustering functions. At the second step, as the coordinates cell nodes have been computed and the incremental distance between each two nodes has been evaluated, the original coordinate of each node is then computed utilizing the same fitted polynomial with the mean value theorem but reversibly.
The method is utilized to predict
... Show MoreA recent study compared experimentally the hydraulic and thermal activity of twisted tape inserts for two types, metal foam twisted tape (MFTT) and traditional twisted tape (TTT), in a double pipe heat exchanger. The investigation goal of the innovatively designed MFTT is to enhance the heat transfer process, which provides a higher thermal enhancement factor over those of TTT under the same conditions. Heat transfer activity in terms of Nusselt number (