Heat pipes and two‐phase thermosyphon systems are passive heat transfer systems that employ a two‐phase cycle of a working fluid within a completely sealed system. Consequently, heat exchangers based on heat pipes have low thermal resistance and high effective thermal conductivity, which can reach up to the order of (105 W/(m K)). In energy recovery systems where the two streams should be unmixed, such as airconditioning systems of biological laboratories and operating rooms in hospitals, heat pipe heat exchangers (HPHEs) are recommended. In this study, an experimental and theoretical study was carried out on the thermal performance of an air‐to‐air HPHE filled with two refrigerants as working fluids, R22 and R407c. The heat pipe heat exchanger used was composed of two rows of copper heat pipes in a staggered manner, with 11 pipes per row. Tests were conducted at different airflow rates of 0.14, 0.18, and 0.22m3/h, evaporator inlet‐air temperatures of 40, 44, and 50°C, filling ratios of 45%, 70%, and 100%, and ratios of heat capacity rate of the evaporator to condenser sections (Ce/Cc) of 1 and 1.5. For HPHE's steady‐state operation, a mathematical model for heat‐transfer performance was set and solved using MATLAB. Results illustrated that the heat transfer rate was in direct proportion with the evaporator inlet‐air temperature and flow rate. The highest HPHE's effectiveness was obtained at a 100% filling ratio and (Ce/Cc) of 1.5. The predicted and experimental values of condenser outletair temperature were in good agreement, with a maximum difference of 3%. HPHE's effectiveness was found to increase with the increase in evaporator inletair temperature and number of transfer units (NTU) and with the decrease in airflow rate, up to 33% and 20% for refrigerants R22 and R407c, respectively. Refrigerant R22 was the superior of the two refrigerants investigated.
In this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The present work describes guggul as a novel carrier for some anti-inflammatory drugs. Guggulusomes containing different concentration of guggul with aceclofenac were prepared by sonication method and characterized for vesicle shape, size, size-distribution, pH, viscosity, spread ability, homogeneity, and accelerated stability in-vitro drug permeation through mouse skin. The vesicles exhibited an entrapment efficiency of 93.2 ± 12%, vesicle size of 0.769 ± 3μm and a zeta potential of - 6.21mV. In vitro drug release was analyzed using Franz’s diffusion cells. The cumulative release of the guggulusomes gel (G2) was 75.8% in 18 hrs, which is greater than that all the gel formulation. The stability profile of prepare
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MorePurpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad. Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements. Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show More