PC-based controller is an approach to control systems with Real-Time parameters by controlling selected manipulating variable to accomplish the objectives. Shell and tube heat exchanger have been identified as process models that are inherently nonlinear and hard to control due to unavailability of the exact models’ descriptions. PC and analogue input output card will be used as the controller that controls the heat exchanger hot stream to the desired temperature.
The control methodology by using four speed pump as manipulating variable to control the temperature of the hot stream to cool to the desired temperature.
In this work, the dynamics of cross flow shell and tube heat exchanger is modeled from step changes in cold water flow rate (manipulated variable). The model is identified to be First Order plus Dead Time (FOPDT).
The objective of this work is to design and implement a controller to regulate the outlet temperature of hot water that is taken as controlled variable. The comparison of the designed PI controller with the PC-Based controller performance (according to rise time, percentage overshoot and settling time) shows a good agreement for PC-Based to control the system.
In this paper, we discuss a fluid problem that has wide applications in biomechanics, polymer industries, and biofluids. We are concerned here with studying the combined effects of porous medium and heat transfer on MHD non-Newtonian Jeffery fluid which flows through a two dimensional asymmetric, inclined tapered channel. Base equations, represented by mass conservation, motion, energy and concentration conservation, were formulated first in a fixed frame and then transformed into a moving frame. By holding the assumptions of “long wavelength and low Reynolds number†these physical equations were simplified into differential equations. Approximate solutions for the velocity profile, stream function, and temperature profile we
... Show MoreThe ceramic composite with different proportions of clay and silica was prepared with a grain size of 70 μm and the weight percentage was selected for four groups (clayx silica100-x) were x q15, 25, 30 and 50. In this manuscript, for each pressured sample, a sintering procedure was carried out for 3 hours under static air and at various sintering temperatures (1000, 1100, 1200, 1400)°C. After sintering, the density, porosity, water absorption, compression strength and thermal conductivity were measured. The best results were obtained using a mixture of 15% clay and 85% silica which were sintering at 1400°C for three hours under air.
The present research focuses on the study of the effect of mass transfer resistance on the rate of heat transfer in pool boiling. The nucleate pool boiling heat transfer coefficients for binary mixtures (ethanol-n-butanol, acetone-n-butanol, acetone-ethanol, hexane-benzene, hexane-heptane, and methanol-water) were measured at different concentrations of the more volatile components. The systems chosen covered a wide range of mixture behaviors.
The experimental set up for the present investigation includes electric heating element submerged in the test liquid mounted vertically. Thermocouple and a digital indictor measured the temperature of the heater surface. The actual heat transfer rate being obtained by multiplying the voltme
... Show MoreThis study deals with free convection heat transfer for the outer surface of two
cylinders of the shape of (Triangular & Rectangular fined cylinders with 8-fins),
putted into two different spaces; small one with dimension of (Length=1.2m,
height=1m, width=0.9m) and large one with dimension of (Length=3.6m, height =3m,
width=2.7m). The experimental work was conducted with air as a heat transport
medium. These cylinders were fixed at different slope angles (0o, 30o, 60o and 90o)
.The heat fluxes were (279, 1012, 1958, 3005, 4419) W/m2, where heat transferred by
convection and radiation. In large space, the results show that the heat transfer from
the triangular finned cylinder is maximum at a slope angle equals
Background: Debonding and fracture of artificial teeth from denture bases are common clinical problem, bonding of artificial teeth to heat cure acrylic and high impact heat cure acrylic denture base materials with autoclave processing method is not well known. The aim of this study was to evaluate the effect of autoclave processing method on shear bond of artificial teeth to heat cure denture base material and high impact heat cure denture base material. Materials and methods: Heat polymerized (Vertex) and high impact acrylic (Vertex) acrylic resins were used. Teeth were processed to each of the denture base materials after the application of different surface treatments. The sample (which consist of artificial tooth attached to the dentur
... Show MoreData security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show MoreAlzheimer’s disease (AD) is an age-related progressive and neurodegenerative disorder, which is characterized by loss of memory and cognitive decline. It is the main cause of disability among older people. The rapid increase in the number of people living with AD and other forms of dementia due to the aging population represents a major challenge to health and social care systems worldwide. Degeneration of brain cells due to AD starts many years before the clinical manifestations become clear. Early diagnosis of AD will contribute to the development of effective treatments that could slow, stop, or prevent significant cognitive decline. Consequently, early diagnosis of AD may also be valuable in detecting patients with dementia who have n
... Show MoreIdentifying the total number of fruits on trees has long been of interest in agricultural crop estimation work. Yield prediction of fruits in practical environment is one of the hard and significant tasks to obtain better results in crop management system to achieve more productivity with regard to moderate cost. Utilized color vision in machine vision system to identify citrus fruits, and estimated yield information of the citrus grove in-real time. Fruit recognition algorithms based on color features to estimate the number of fruit. In the current research work, some low complexity and efficient image analysis approach was proposed to count yield fruits image in the natural scene. Semi automatic segmentation and yield calculation of fruit
... Show MoreActivity recognition (AR) is a new interesting and challenging research area with many applications (e.g. healthcare, security, and event detection). Basically, activity recognition (e.g. identifying user’s physical activity) is more likely to be considered as a classification problem. In this paper, a combination of 7 classification methods is employed and experimented on accelerometer data collected via smartphones, and compared for best performance. The dataset is collected from 59 individuals who performed 6 different activities (i.e. walk, jog, sit, stand, upstairs, and downstairs). The total number of dataset instances is 5418 with 46 labeled features. The results show that the proposed method of ensemble boost-based classif
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show More