This study examines experimentally the performance of a horizontal triple concentric tube heat exchanger TCTHE made of copper metal using water as cooling fluid and oil-40 as hot fluid. Hot fluid enters the inner annular tube of the TCTHE in a direction at a temperature of 50, 60 and 70 oC and a flow rate of 20 l/hr. On the other hand, the cooling fluid enters the inner tube and the outer annular tube in the reverse direction (counter current flow) at a temperature of 25 oC and flow rates of 10, 15, 20, 25, 30 and 35 l/hr. The TCTHE is composed of three copper tubes with outer diameters of 34.925 mm, 22.25 mm, and 9.525 mm, and thicknesses of 1.27 mm, 1.143 mm, and 0.762 mm, respectively. TCTHE tube's length was 670 mm. Nusselt number, overall heat transfer coefficient, convective heat transfer coefficient (CHTC), friction factor and pressure drop were measured from the obtained experimental results and plotted in graphs against Reynold number and volumetric flow rate of water. These parameters appeared good results in the cooling process. Nusselt numbers increased linearly with DIW flow rate for both C1 and C2 reaching maximum values of 38.25 and 14.64 respectively. CHTC increased linearly with the DIW flow rate for both C1 and C2 reaching maximum values of 2934.3 and 871.7 respectively. Overall heat transfer coefficient of DIW reached maximum values of 296.36 and 251.4 at 35 l/hr for C1 and C2, respectively. Friction factor DIW in C1 and C2 decreased with the volumetric flow rate increases, reaching minimum values of 0.04 and 0.25 respectively. Pressure drop of DIW increased linearly with flow rate reaching maximum values of 81.4 and 4.31 for C1 and C2 respectively. This in turn leads to reduced TCTHE length and size leading to a decrease in the construction cost of the heat exchanger.
The present study provides a new insight into valuable information on the diverse structure of the Anisakid population and discusses the limited species richness in the Nemipterus japonicus (Bloch,1791) (Perciformes, Nemiperidae). The fishing area consists of various locations in the Arabian Gulf (29°58 0 33 00 N48°28 0 20 E). A total of 315 marine fish were examined, (n=287) were infected. Larval stages (n= 763) encysted within the mesenteries peritoneum and viscera of fish organs were isolated, with a prevalence of 91.11% of infection and, the intensity was 2.65. Molecular analysis was carried out on thirty individuals who have examined the morphology and showed some appearance differences, by amplifying internal transcribed spacers
... Show MoreThe research includes the synthesis and identification of the mixed ligands complexes of M 2 Ions in general composition ,[M(Leu) 2 (SMX)] Where L leucine (C 6 H 13 NO 2 )symbolized (LeuH) as a primary ligand and Sulfamethoxazole C 10 H 11 N 3 O 3 S) symbolized (SMX)) as a secondary ligand . The ligands and the metal chlorides were brought in to reaction at room temperature in(v/v) ethanol /water as solvent containing NaOH. The reaction required the following [(metal: 2(Na Leu --): (SMX )] molar ratios with M(II) ions, Were M ( Mn ( II),Co (II),Ni(II),Cu( II),Zn (II),Cd(II)and Hg( The UV Vis and magnetic moment data revealed an octahedral geometry around M(II), The conductivity data show a non electrolytic nature of the complexes . The
... Show MoreRole of public relations (PR) and from one community to another, depending on the different cultures of these societies in General, and different ethical values established by their practitioners in these communities organizations , public relations in developed societies, and in some developing countries have taken great strides to contribute to the strategic planning and decision-making, in the framework of their commitment to the values and ethical standards for practitioners, In contrast, we find that applied in Iraq still skips phase coordinate with different communication means with the aim of advertising and publicity for the organization. As a result of the limited recognition of the strategic and vital
... Show More
This present work adopts the analytic and descriptive methodology to recognize and analyze the major challenges faced by the Iraqi government. The study focuses on the press and national partiers’ cabipility of changing and unifying the opinions of the public in a way that serves the Iraqi interest, taking into account the fact that the press is the fourth authority after the three major authorities, (Executive, Legislation and Judicial). The researcher has concluded that the Iraqi press and parties initiated a national front with the Iraqi people against the government’s signature of the treaty of (1930). The national front illustrated that signing the treaty strengthens the authority of the British occupation u
... Show MoreThe research dealt with the effect of the tax examiner's efficiency in detecting tax evasion, as the research problem dealt with tax evasion, especially in Iraq, for many reasons and factors, including those related to tax administration represented in administrative corruption and the complexity of procedures in the tax accounting process and failure to achieve justice in the tax treatment, including the taxpayer himself, as he tries to evade for reasons Related to the level of tax awareness, loss of confidence in the tax administration, and reasons related to the state's inability to manage the services file well and its ability to achieve the set goals, This reflected negatively on the emergence of some of the consequences of
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreIt is the regression analysis is the foundation stone of knowledge of statistics , which mostly depends on the ordinary least square method , but as is well known that the way the above mentioned her several conditions to operate accurately and the results can be unreliable , add to that the lack of certain conditions make it impossible to complete the work and analysis method and among those conditions are the multi-co linearity problem , and we are in the process of detected that problem between the independent variables using farrar –glauber test , in addition to the requirement linearity data and the lack of the condition last has been resorting to the
... Show More