Implementation of a new research indicator to QS ranking system
...Show More Authors
This study aims to assess the effect of adding twisted fins in a triple-tube heat exchanger used for latent heat storage compared with using straight fins and no fins. In the proposed heat exchanger, phase change material (PCM) is placed between the middle annulus while hot water is passed in the inner tube and outer annulus in a counter-current direction, as a superior method to melt the PCM and store the thermal energy. The behavior of the system was assessed regarding the liquid fraction and temperature distributions as well as charging time and energy storage rate. The results indicate the advantages of adding twisted fins compared with those of using straight fins. The effect of several twisted fins was also studied to discover
... Show MoreThis paper focuses on the most important element of scientific research: the research problem which is confined to the concept of concern or concern surrounding the researcher about any event or phenomenon or issue paper and need to be studied and addressed in order to find solutions for them, to influence the most scientific research steps from asking questions and formulating hypotheses, to employ suitable methods and tools to choose the research and sample community, to employ measurement and analysis tools. This problem calls for a great effort by the researcher intellectually or materially to develop solutions.
The presence of research Repositories in the intellectual production of universities and their availability through their websites or through their scientific institutions is one of the criteria for evaluating these universities in the international classifications of the best universities, in addition to preserving the intellectual output of these universities for a long time and safely and preserving the property rights of researchers. And made them available through their websites. The purpose of this research is to identify the concept of digital content and research repositories and its origin, and to indicate the importance of its existence through the websites of universities and their types, and to identify the research repositories
... Show MoreIn this paper, an eco-epidemiological prey-predator system when the predator is subjected to the weak Allee effect, and harvesting was proposed and studied. The set of ordinary differential equations that simulate the system’s dynamic is constructed. The impact of fear and Allee’s effect on the system's dynamic behavior is one of our main objectives. The properties of the solution of the system were studied. All possible equilibrium points were determined, and their local, as well as global stabilities, were investigated. The possibility of the occurrence of local bifurcation was studied. Numerical simulation was used to further evaluate the global dynamics and understood the effects of varying parameters on the asymptotic behavior of t
... Show MoreApplying a well-performing heat exchanger is an efficient way to fortify the relatively low thermal response of phase-change materials (PCMs), which have broad application prospects in the fields of thermal management and energy storage. In this study, an improved PCM melting and solidification in corrugated (zigzag) plate heat exchanger are numerically examined compared with smooth (flat) plate heat exchanger in both horizontal and vertical positions. The effects of the channel width (0.5 W, W, and 2 W) and the airflow temperature (318 K, 323 K, and 328 K) are exclusively studied and reported. The results reveal the much better performance of the horizontal corrugated configuration compared with the smooth channel during both melti
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe research aims to shed light on the recent experience in the Iraqi business environment, which is the experience of the merger. To evaluate a recent experience in an important sector of the Iraqi business sectors, namely the industrial sector to enable decision-makers to review that experience to judge the extent of its success and address some of the lapses that experience that by measuring synergies can be judged on the success of the merger experience or not. The research community is the governmental industrial sector. The research sample included six cases of merger (14) companies before the merger. The Holt method was used to predict the net sales and total cost values before the merger as if it were not merged. Th
... Show More