|
Natural convection in an annular space provided with metal foam fins attached to the inner cylinder is studied numerically. The metal foam fins made of copper were inserted in different axial sections with three fins in each section. The temperature of the inner cylinder is kept constant while the annular outer surface is adiabatic. The thickness effect of the inner pipe wall was considered. Naiver Stokes equation with Boussinesq approximation is used for the fluid regime while Brinkman-Forchheimer Darcy model is used for metal foam. In addition, the local thermal non-equilibrium condition in the energy equation of the porous media is presumed. The effect of Rayleigh number and number of foam fins in the axial direction, on fluid flow and heat transfer characteristics, were examined. The current model was valid with the available published results and good agreement is noticed. Results showed that as the Rayleigh number increases the dominated of convection mode increases and average Nusselt increases. It was found that at Rayleigh of 106 Nusselt reached its higher value which is 4.6 for the case of adding seven axial metal foams. A comparison between adding foam fins and copper fins was established for a range of Rayleigh numbers between 104 and 106. It showed a good enhancement in Nusselt number and the greatest enhancement percentage was 45.9% at Rayleigh equal 106 for the case of using seven sections of foam fins. |
تم التطرق في هذا البحث الى دور الذكاء الاصطناعي والتكنولوجيا الحديثة في العملية التدريبية بما يخدم أهدافه والاستفادة منه من خلال المخرجات الجيدة، حيث ان توظيف التكنولوجيا في تدريب رياضة المبارزة يسهل العملية التدريبية على المدرب واللاعب ويساهم في تقليل الجهد المبذول والوقت المستغرق ، وهدفت الدراسة الى التعرف على تأثير الجهاز المصنع في ضبط المسافة بين القدمين لدى عينة البحث ،استخدم المنهج التجريبي بت
... Show MoreSolar collectors, in general, are utilized to convert the solar energy into heat energy, where it is employed to generate electricity. The non-concentrating solar collector with a circular shape was adopted in the present study. Ambient air is heated under a translucent roof where buoyant air is drawn from outside periphery towards the collector center (tower base). The present study is aimed to predict and visualize the thermal-hydrodynamic behavior for airflow under inclined roof of the solar air collector, SAC. Three-dimensional of the SAC model using the re-normalization group, RNG, k−ε turbulence viscus model is simulated. The simulation was carried out by using ANSYS-FLUENT 14.5. The simulation
... Show MoreSome research reports that cognitive grammar (CG) theory has good contributions to teaching English as a foreign language. In this research, the researchers seek to apply this theory and its principles when teaching the simple present tense to Iraqi students who face difficulties in differentiating between the multiple usages of this tense. To achieve this objective, the researchers have conducted an experimental study on a group of 60 Iraqi students in the University of Baghdad, College of Education for Women. Langacker’s (2003) theory has been adopted in the analysis of the cognitive relations to understand the common and different connections of these usages of the simple present. The study has concluded that the cognitive grammar t
... Show MoreBoth of the species Typha domengensis and Phragmites communis among the most important plant endemic in flora of Iraq from monocotyledon. Due to the similarity of the two species with each other in many morphological characteristics such as the environment where they live and the form of leaves and type of leaf venation and type of stomata….ets, also both of species belong to monocots plant therefore this research work was conducted find anatomical differences that have the same as taxonomic value to help distinguishing between both species under study. Through this research, we found great importance to the anatomical characteristics which we reached by studying the roots, stems and leaves sections f
... Show MoreStrengthening of the existing structures is an important task that civil engineers continuously face. Compression members, especially columns, being the most important members of any structure, are the most important members to strengthen if the need ever arise. The method of strengthening compression members by direct wrapping by Carbon Fiber Reinforced Polymer (CFRP) was adopted in this research. Since the concrete material is a heterogeneous and complex in behavior, thus, the behavior of the confined compression members subjected to uniaxial stress is investigated by finite element (FE) models created using Abaqus CAE 2017 software. The aim of this research is to study experimentally and numerically, the beha
... Show More
Strengthening of the existing structures is an important task that civil engineers continuously face. Compression members, especially columns, being the most important members of any structure, are the most important members to strengthen if the need ever arise. The method of strengthening compression members by direct wrapping by Carbon Fiber Reinforced Polymer (CFRP) was adopted in this research. Since the concrete material is a heterogeneous and complex in behavior, thus, the behavior of the confined compression members subjected to uniaxial stress is investigated by finite element (FE) models created using Abaqus CAE 2017 software.
The aim of this research is to study experime
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More