Multi-walled carbon nanotubes (MWCNTs) were functionalized by hexylamine (HA) in a promising, cost-effective, rapid and microwave-assisted approach. In order to decrease defects and remove acid-treatment stage, functionalization of MWCNTs with HA was carried out in the presence of diazonium reaction. Surface functionality groups and morphology of chemically-functionalized MWCNTS were characterized by FTIR, Raman spectroscopy, thermogravimetric analysis (DTG), and transmission electron microscopy (TEM). To reach a promising dispersibility in oil media, MWCNTs were functionalized with HA. While the cylindrical structures of MWCNTs were remained reasonably intact, characterization results consistently confirmed the sidewall-functionalization of MWCNTs with HA functionalities. Then, HA-treated MWCNTs-based turbine oil nanofluids (HA-MWCNTs/TO) with different volume fractions were synthesized and employed to be investigated in terms of heat transfer potential. Convective heat transfer coefficient of HA-MWCNTs/TO as a positive parameter and pressure drop as a negative factor were investigated for various volume fractions. While results suggested a weak increase in the pressure drop by MWCNTs loading into the TO, lack of acidic agents, the performance index higher than 1 and a significant increase in the convective heat transfer open a new gateway for introducing this economical product for industrial applications in turbines and can be a capable alternative for conventional TO.
The massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by
... Show MoreBackground: Scientific education aims to be inclusive and to improve students learning achievements, through appropriate teaching and learning. Problem Based Learning (PBL) system, a student centered method, started in the second half of the previous century and is expanding progressively, organizes learning around problems and students learn about a subject through the experience of solving these problems.Objectives:To assess the opinions of undergraduate medical students regarding learning outcomes of PBL in small group teaching and to explore their views about the role of tutors and methods of evaluation. Type of the study: A cross-sectional study.Methods: This study was conducted in Kerbala Medical Colleges among second year students
... Show MoreThis paper demonstrates the design of an algorithm to represent the design stages of fixturing system that serve in increasing the flexibility and automation of fixturing system planning for uniform polyhedral part. This system requires building a manufacturing feature recognition algorithm to present or describe inputs such as (configuration of workpiece) and built database system to represents (production plan and fixturing system exiting) to this algorithm. Also knowledge – base system was building or developed to find the best fixturing analysis (workpiece setup, constraints of workpiece and arrangement the contact on this workpiece) to workpiece.
This Research deals with estimation the reliability function for two-parameters Exponential distribution, using different estimation methods ; Maximum likelihood, Median-First Order Statistics, Ridge Regression, Modified Thompson-Type Shrinkage and Single Stage Shrinkage methods. Comparisons among the estimators were made using Monte Carlo Simulation based on statistical indicter mean squared error (MSE) conclude that the shrinkage method perform better than the other methods
This paper deals with proposing new lifting scheme (HYBRID Algorithm) that is capable of preventing images and documents which are fraud through decomposing there in to the real colors value arrays (red, blue and green) to create retrieval keys for its properties and store it in the database and then check the document originality by retrieve the query image or document through the decomposition described above and compare the predicted color values (retrieval keys) of the query document with those stored in the database. The proposed algorithm has been developed from the two known lifting schemes (Haar and D4) by merging them to find out HYBRID lifting scheme. The validity and accuracy of the proposed algorithm have been ev
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreThis article proposes a new strategy based on a hybrid method that combines the gravitational search algorithm (GSA) with the bat algorithm (BAT) to solve a single-objective optimization problem. It first runs GSA, followed by BAT as the second step. The proposed approach relies on a parameter between 0 and 1 to address the problem of falling into local research because the lack of a local search mechanism increases intensity search, whereas diversity remains high and easily falls into the local optimum. The improvement is equivalent to the speed of the original BAT. Access speed is increased for the best solution. All solutions in the population are updated before the end of the operation of the proposed algorithm. The diversification f
... Show MoreHigh vehicular mobility causes frequent changes in the density of vehicles, discontinuity in inter-vehicle communication, and constraints for routing protocols in vehicular ad hoc networks (VANETs). The routing must avoid forwarding packets through segments with low network density and high scale of network disconnections that may result in packet loss, delays, and increased communication overhead in route recovery. Therefore, both traffic and segment status must be considered. This paper presents real-time intersection-based segment aware routing (RTISAR), an intersection-based segment aware algorithm for geographic routing in VANETs. This routing algorithm provides an optimal route for forwarding the data packets toward their destination
... Show More