Due to the potential cost saving and minimal temperature stratification, the energy storage based on phase-change materials (PCMs) can be a reliable approach for decoupling energy demand from immediate supply availability. However, due to their high heat resistance, these materials necessitate the introduction of enhancing additives, such as expanded surfaces and fins, to enable their deployment in more widespread thermal and energy storage applications. This study reports on how circular fins with staggered distribution and variable orientations can be employed for addressing the low thermal response rates in a PCM (Paraffin RT-35) triple-tube heat exchanger consisting of two heat-transfer fluids flow in opposites directions through the inner and the outer tubes. Various configurations, dimensions, and orientations of the circular fins at different flow conditions of the heat-transfer fluid were numerically examined and optimized using an experimentally validated computational fluid-dynamic model. The results show that the melting rate, compared with the base case of finless, can be improved by 88% and the heat charging rate by 34%, when the fin orientation is downward–upward along the left side and the right side of the PCM shell. The results also show that there is a benefit if longer fins with smaller thicknesses are adopted in the vertical direction of the storage unit. This benefit helps natural convection to play a greater role, resulting in higher melting rates. Changing the fins’ dimensions from (thickness × length) 2 × 7.071 mm2 to 0.55 × 25.76 mm2 decreases the melting time by 22% and increases the heat charging rate by 9.6%. This study has also confirmed the importance of selecting the suitable values of Reynolds numbers and the inlet temperatures of the heat-transfer fluid for optimizing the melting enhancement potential of circular fins with downward–upward fin orientations.
لطالما كان انتظار الملأ للخلاص والتي ترتبط بشكل اساسي بال "منتظر" او ال "مخلص" جزءا من الوعي الجمعي الذي تطور ليكون مرتبطا بالنمط البدائي والذي بدوره أصبح مرآةً تنعكس على اساسها فرص الانسان نحو النجاة. في مسرح القرن العشرين, لم تنفك فكرة الانتظار ان ترتبط بمسرحية صاموئيل بيكيت العبثية " في انتظار غودو" كونها مثالا رمزيا بالرغم من انه تجسيد شخصية "غودو" وقعت تحت وطأة الكثير من عمليات التحوير والتغيير في اطاره
... Show MoreSince the emergence of the science of international relations as an independent academic scientific field, various theories and trends have appeared and have tried to understand and explain the international reality and give a clear picture of what is happening within the international system of interactions and influences and the search for tools for stability and peace in international relations. Among these theories is the feminist theory, which is a new intellectual trend on the level of international relations theories, which tried to give an explanation of what is happening in world politics and in international relations in particular. The main issue that feminist theory is concerned with is the lack of women’s subordination
... Show MoreThe hydraulic behavior of the flow can be changed by using large-scale geometric roughness elements in open channels. This change can help in controlling erosions and sedimentations along the mainstream of the channel. Roughness elements can be large stone or concrete blocks placed at the channel's bed to impose more resistance in the bed. The geometry of the roughness elements, numbers used, and configuration are parameters that can affect the flow's hydraulic characteristics. In this paper, velocity distribution along the flume was theoretically investigated using a series of tests of T-shape roughness elements, fixed height, arranged in three different configurations, differ in the number of lines of roughness element
... Show MoreMultiple myeloma is hematological disease produces many complications in the bone, kidney, neural and other complications. The study aims to measure serum biomolecules like fetuin-A and resistin and determined the possibility to use these biomarkers as disease predictor. blood samples were isolated from 58 patients and 24 sex and age-matched control, serum then isolated, and proper ELISA kit then used to a determined level of B2 microglobulin, resistin, and fetuin-A. The result demonstrated significant increase in B2 microglobulin, fetuin-A and resistin in patients compare to control (1.3470.714 vs. 0.9130.253), p = 0.000, (14.00310.352 vs. 9.2594.264), p= 0.005, (1.9673.595 vs. 0.6040.622), p = 0.009, respectively. &
... Show MoreIn Iraq, because of the dramatic turnovers facing the country for three decades, pharmacists continue to experience significant professional challenges in both the public and private sectors. The present study aimed to explore the professional challenges and obstacles facing Iraqi pharmacists working in public hospitals. This qualitative study included face-to-face semi-structured interviews with open-ended questions with hospital pharmacists. The participants were selected purposefully (with ≥ 3 years of experience) to work at governmental hospitals in Karbala province between December 2022 and April 2023. The audio-recording interviews were scripted. Thematic analyses were used to generate themes and subthemes from the interview
... Show MoreThis study examines the causes of time delays and cost overruns in a selection of thirty post-disaster reconstruction projects in Iraq. Although delay factors have been studied in many countries and contexts, little data exists from countries under the conditions characterizing Iraq during the last 10-15 years. A case study approach was used, with thirty construction projects of different types and sizes selected from the Baghdad region. Project data was gathered from a survey which was used to build statistical relationships between time and cost delay ratios and delay factors in post disaster projects. The most important delay factors identified were contractor failure, redesigning of designs/plans and change orders, security is
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreObjective: To measure the effect of the pharmacist-led medication reconciliation service before hospital discharge on preventing potential medication errors. Methods: This behavioral interventional study took place in a public teaching hospital in Iraq between December 2022 and January 2023. It included inpatients who were taking four or more medications upon discharge from the internal medicine ward and the cardiac care unit. The researcher provided the patients with a medication reconciliation form and reconciliation form (including medication regimen and pharmacist instructions) before discharging them home. Any discrepancies between the patients’ understanding and the actual medication recommendations prescribed by the physici
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More