Preferred Language
Articles
/
fYa7U4YBIXToZYAL8YL1
Laminar convective heat transfer of hexylamine-treated MWCNTs-based turbine oil nanofluid
...Show More Authors

Multi-walled carbon nanotubes (MWCNTs) were functionalized by hexylamine (HA) in a promising, cost-effective, rapid and microwave-assisted approach. In order to decrease defects and remove acid-treatment stage, functionalization of MWCNTs with HA was carried out in the presence of diazonium reaction. Surface functionality groups and morphology of chemically-functionalized MWCNTS were characterized by FTIR, Raman spectroscopy, thermogravimetric analysis (DTG), and transmission electron microscopy (TEM). To reach a promising dispersibility in oil media, MWCNTs were functionalized with HA. While the cylindrical structures of MWCNTs were remained reasonably intact, characterization results consistently confirmed the sidewall-functionalization of MWCNTs with HA functionalities. Then, HA-treated MWCNTs-based turbine oil nanofluids (HA-MWCNTs/TO) with different volume fractions were synthesized and employed to be investigated in terms of heat transfer potential. Convective heat transfer coefficient of HA-MWCNTs/TO as a positive parameter and pressure drop as a negative factor were investigated for various volume fractions. While results suggested a weak increase in the pressure drop by MWCNTs loading into the TO, lack of acidic agents, the performance index higher than 1 and a significant increase in the convective heat transfer open a new gateway for introducing this economical product for industrial applications in turbines and can be a capable alternative for conventional TO.

Scopus Clarivate Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Groundwater Quality Study Based on the Existence of Escherichia coli as Bioindicator
...Show More Authors
Abstract<p>The research aim was to observe the distribution pattern of <italic>Escherichia coli</italic> as groundwater pollution indicator in the most populous area, Matraman Sub-District Area in Jakarta, Indonesia (106°49’35” EL and 06°10’37” SL) consists of six (6) Urban Villages. The existence of <italic>Escherichia coli</italic> was measured with Most Probable Number (MPN) method as mentioned in Indonesian Standard Number 01-2332.1-2006. This research was also measure pollution parameter of Dissolved Oxygen (DO) and pH, and topography analyses used as well to determine groundwater flow direction. Groundwater sampling was conducted in several housings that have </p> ... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Feb 28 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Flying Ad hoc Networks (FANET): Performance Evaluation of Topology Based Routing Protocols
...Show More Authors

Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct

... Show More
View Publication Preview PDF
Crossref (29)
Crossref
Publication Date
Mon Nov 01 2010
Journal Name
Journal Of Systems And Software
Development of Java based RFID application programmable interface for heterogeneous RFID system
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Fme Transactions
Development of automated liquid filling system based on the interactive design approach
...Show More Authors

The automatic liquid filling system is used in different applications such as production of detergents, liquid soaps, fruit juices, milk products, bottled water, etc. The automatic bottle filling system is highly expensive. Where, the common filling systems required to complex changes in hardware and software in order to modify volume of liquid. There are many important variables in the filling process such as volume of liquid, the filling time, etc. This paper presents a new approach to develop an automatic liquid filling system. The new proposed system consists of a conveyor subsystem, filling stations, and camera to detect the level of the liquid at any instant during the filling process. The camera can detect accurately the leve

... Show More
View Publication
Scopus (18)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sun Mar 06 2022
Journal Name
Cogent Arts &humanities
A corpus-based stylistic analysis of online suicide notes retrieved from Reddit
...Show More Authors

.

View Publication
Scopus (10)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Measuring and Analyzing The Causal Relationship between Investing Government Expenditure non-oil GDP in Iraq For The Period (1990-2011)
...Show More Authors

The investment government expenditure is considered the fundamental of enhancing the economic activity as it has become a mean for achieving capital accumulation in all economic  sectors, The Iraqi economy is characterized of being yield unilateral depending petroleum  revenues as an essential  resource of financing government expenditure , as  the contribution of petroleum  sector in GDP is large in proportions to other economic sectors  contribution.

 The relationship between investing government expenditure, and non-oil GDP  is about to be not existent during the

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Apr 22 2019
Journal Name
Spe
Evaluation of Gas and Downhole Water Sink-Assisted Gravity Drainage GDWS-AGD Process in Saturated Oil Reservoirs with Infinite-Acting Aquifer
...Show More Authors
Abstract<p>A hybrid Gas-Enhanced and Downhole Water Sink-Assisted Gravity Drainage (GDWS-AGD) process has been suggested to enhance oil recovery by placing vertical injectors for CO2 at the top of the reservoir with a series of horizontal oil-producing and water-drainage wells located above and below the oil-water contact, respectively. The injected gas builds a gas cap that drives the oil to the (upper) oil-producing wells while the bottom water-drainage wells control water cresting. The hybrid process of GDWS-AGD process has been first developed and tested in vertical wells to minimize water cut in reservoirs with bottom water drive and strong water coning tendencies. The wells were dual-compl</p> ... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More