Applying a well-performing heat exchanger is an efficient way to fortify the relatively low thermal response of phase-change materials (PCMs), which have broad application prospects in the fields of thermal management and energy storage. In this study, an improved PCM melting and solidification in corrugated (zigzag) plate heat exchanger are numerically examined compared with smooth (flat) plate heat exchanger in both horizontal and vertical positions. The effects of the channel width (0.5 W, W, and 2 W) and the airflow temperature (318 K, 323 K, and 328 K) are exclusively studied and reported. The results reveal the much better performance of the horizontal corrugated configuration compared with the smooth channel during both melting and solidification modes. It is found that the melting rate is about 8% faster, and the average temperature is 4 K higher in the corrugated region compared with the smooth region because of the large heat-exchange surface area, which facilitates higher rates of heat transfer into the PCM channel. In addition to the higher performance, a more compact unit can be achieved using the corrugated system. Moreover, applying the half-width PCM channel accelerates the melting rate by eight times compared to the double-width channel. Meanwhile, applying thicker channels provides faster solidification rates. The melting rate is proportional to the airflow temperature. The PCM melts within 274 s when the airflow temperature is 328 K. However, the melting time increases to 460 s for the airflow temperature of 308 K. Moreover, the PCM solidifies in 250 s and 405 s in the cases of 318 K and 328 K airflow temperatures, respectively.
With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreApplications of nonlinear, time variant, and variable parameters represent a big challenge in a conventional control systems, the control strategy of the fuzzy systems may be represents a simple, a robust and an intelligent solution for such applications.
This paper presents a design of fuzzy control system that consists of three sub controllers; a fuzzy temperature controller (FC_T), a fuzzy humidity controller (FC_H) and a ventilation control system; to control the complicate environment of the greenhouse (GH) using a proposed multi-choice control system approach. However, to reduce the cost of the crop production in the GH, the first choice is using the ventilation system to control the temperature and humidit
... Show MoreIn this paper, the first integrals of Darboux type of the generalized Sprott ET9 chaotic system will be studied. This study showed that the system has no polynomial, rational, analytic and Darboux first integrals for any value of . All the Darboux polynomials for this system were derived together with its exponential factors. Using the weight homogenous polynomials helped us prove the process.
Thrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economic
... Show MoreThe Shiite religious authority in Iraq has played an active and vital role over its long history in promoting values of tolerance, rejecting extremism, advocating unity and confronting external challenges. This role has increased significantly after 2003 as a result of the great challenges that have passed in Iraq. Despite its clear policy of non-interference in political matters, except in cases of necessity, but the great role it played in maintaining national unity and advocating the rejection of extremism and sectarianism has made it a necessary need in Iraq to confront any deviations, dispersions or threats that affect society and the state. Therefore, its role in the process of reform was prominent on the political level by calling
... Show MoreObjective: To determine the functional and radiological outcomes of lower third tibia closed fractures fixed by nail or plate osteosynthesis. Methodology: This randomized controlled trial included 20 patients presenting with closed fracture lower third tibia in Al-Kindy teaching hospital, Baghdad, Iraq. The patients were divided as every other one into two equal groups; group I had fractures fixed by 3.5 mm locked plate and group II by intramedullary locking nail. We followed all patients for 24 weeks to assess surgical complications, fracture union, alignment and functional outcome based on Knee society score (KSS). Results: The mean union time in both groups was 10.2 ± 1.48 and 9.3 ± 1.77 weeks, respectively (p = 0.003). Mean KSS in bot
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreConjugate heat transfer has significant implications on heat transfer characteristics, particularly in thick wall applications and small diameter pipes. In this study, a three-dimensional numerical investigation was carried out using commercial CFD software “ANSYS FLUENT” to study the influence of conjugate heat transfer of laminar flow in mini channels at constant heat flux wall conditions. Two parameters were studied and analyzed: the wall thickness and thermal conductivity and their effect on heat transfer characteristics such as temperature profile and Nusselt number. Thermal conductivity of (0.25, 10, 202, and 387) W/m2C and wall thickness of (1, 5, and 50) mm were used for a channel of (1*2) mm cross
... Show MoreAbstract
In this paper presents two dimensional turbulent flow of different nanofluids and ribs configuration in a circular tube have been numerically investigation using FLUENT 6.3.26. Two samples of CuO and, ZnO nanoparticles with 2% v/v concentration and 40 nm as nanoparticle diameter combined with trapezoidalribs with aspect ratio of p/d=5.72 in a constant tube surface heat flux were conducted for simulation. The results showed that heat flow as Nusselt number for all cases raises with Reynolds number and volume fraction of nanofluid, likewise the results also reveal that ZnO with volume fractions of 2% in trapezoidal ribs offered highest Nusselt number at Reynolds number of Re= 30000.
Key
... Show More