Heat pipes and two‐phase thermosyphon systems are passive heat transfer systems that employ a two‐phase cycle of a working fluid within a completely sealed system. Consequently, heat exchangers based on heat pipes have low thermal resistance and high effective thermal conductivity, which can reach up to the order of (105 W/(m K)). In energy recovery systems where the two streams should be unmixed, such as airconditioning systems of biological laboratories and operating rooms in hospitals, heat pipe heat exchangers (HPHEs) are recommended. In this study, an experimental and theoretical study was carried out on the thermal performance of an air‐to‐air HPHE filled with two refrigerants as working fluids, R22 and R407c. The heat pipe heat exchanger used was composed of two rows of copper heat pipes in a staggered manner, with 11 pipes per row. Tests were conducted at different airflow rates of 0.14, 0.18, and 0.22m3/h, evaporator inlet‐air temperatures of 40, 44, and 50°C, filling ratios of 45%, 70%, and 100%, and ratios of heat capacity rate of the evaporator to condenser sections (Ce/Cc) of 1 and 1.5. For HPHE's steady‐state operation, a mathematical model for heat‐transfer performance was set and solved using MATLAB. Results illustrated that the heat transfer rate was in direct proportion with the evaporator inlet‐air temperature and flow rate. The highest HPHE's effectiveness was obtained at a 100% filling ratio and (Ce/Cc) of 1.5. The predicted and experimental values of condenser outletair temperature were in good agreement, with a maximum difference of 3%. HPHE's effectiveness was found to increase with the increase in evaporator inletair temperature and number of transfer units (NTU) and with the decrease in airflow rate, up to 33% and 20% for refrigerants R22 and R407c, respectively. Refrigerant R22 was the superior of the two refrigerants investigated.
In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreLanguage plays a major role in all aspects of life. Communication is regarded as the most important of these aspects, as language is used on a daily basis by humanity either in written or spoken forms. Language is also regarded as the main factor of exchanging peoples’ cultures and traditions and in handing down these attributes from generation to generation. Thus, language is a fundamental element in identifying peoples’ ideologies and traditions in the past and the present. Despite these facts, the feminist linguists have objections to some of the language structures, demonstrating that language is gender biased to men. That is, language promotes patriarchal values. This pushed towards developing extensive studies to substantiate s
... Show MoreEvery body has a size and mass that distinguishes it from others and makes it different from others. Some of these bodies are huge and large in size, and some are small and light in weight. Among these masses and bodies are some that are dealt with by their size and weight, each according to its quantity, weight, and cheapness. This is why they created quantities by which these weights and quantities could be estimated, so they used measures and weights for that. Objectives: The research aims to know some measures and weights, such as the wife’s maintenance, the amount of zakat, etc.I found it to be a widely spread topic, and widely used in the folds of jurisprudence. During my reading of jurisprudence books, I found jurists using many qu
... Show MoreResearching the effects of the research and technological development contract, determining its extent and demarcating the boundaries of the obligations imposed in it, is the cornerstone of economic growth and development, because defining these obligations removes the ambiguity and conflict between interests, by stating the rights owed to each party and even trying to reconcile them, or impose protection by specifying guarantees that are compatible with the essence of the R&D contract, For the purpose of studying the subject thoroughly, we will divide this research into two sections. The first is devoted to identifying the parties to the research and technological development contract. As for the other topic, we will explain the obligation
... Show MoreIn this research the a-As flims have been prepared by thermal evaporation with thickness 250 nm and rata of deposition r_d(1.04nm/sec) as function to annealing temperature (373 and 473K), from XRD analysis we can see that the degree of crystalline increase with T_a, and I-V characteristic for dark and illumination shows that forward bias current varieties approximately exponentially with voltage bias. Also we found that the quality factor and saturation current dependence on annealing temperatures.
Traditionally, style is defined as the expressive, emotive or aesthetic emphasis added linguistically to the discourse with its meaning is the same. In the current study, however, style is defined as the linguistic choice that the language users can make for specific purposes.
This study, thus, aims at analyzing political Arabic and English speeches to find out whether there are differences of style between English and Arabic and whether the choices the language users make can show any traits of their psychological status.
To fulfill the above aims, the study hypothesizes that English and Arabic speeches can be analyzed stylistically and that there are stylistic difference
... Show MoreThe present paper respects 'inversion' as a habit of arranging the language of modern English and Arabic poetry . Inversion is a significant phenomenon generally in modern literature and particularly in poetry that it treats poetic text as it is a violator to the ordinary text. The paper displays the common patterns and functions of inversion which are spotted in modern English and Arabic poetry in order to show aspects of similarities and differences in both languages. It concludes that inversion is most commonly used in English and Arabic poetry in which it may both satisfy the demands of sound correspondence and emphasis. English and Arabic poetic languages vary in extant to their manipulation of inverted styles as they show changeable f
... Show MoreIt is well known that the spread of cancer or tumor growth increases in polluted environments. In this paper, the dynamic behavior of the cancer model in the polluted environment is studied taking into consideration the delay in clearance of the environment from their contamination. The set of differential equations that simulates this epidemic model is formulated. The existence, uniqueness, and the bound of the solution are discussed. The local and global stability conditions of disease-free and endemic equilibrium points are investigated. The occurrence of the Hopf bifurcation around the endemic equilibrium point is proved. The stability and direction of the periodic dynamics are studied. Finally, the paper is ended with a numerical simul
... Show MoreGeographic information system (GIS) is utilized in a variety of tasks such as, resource management, urban planning, emergency planning in case of accident, and rapid response etc. The aim of this study is to produce a digital map with the aid of GIS and a survey data. A survey data is conducted with Total Station technique on sanitary planning positions. The campus of Baghdad University is chosen to test the execution and accuracy of the results for sewer manholes locations. During the field survey, Total Station (Nikon Nivo) is used to identify the 3-D coordinates for each location. Finally, Geographical Information System (GIS) are utilized to present the digital map of the network sewer pipe line to the end users. Although Geographic Inf
... Show More