The ejector refrigeration system is a desirable choice to reduce energy consumption. A Computational Fluid Dynamics CFD simulation using the ANSYS package was performed to investigate the flow inside the ejector and determine the performance of a small-scale steam ejector. The experimental results showed that at the nozzle throat diameter of 2.6 mm and the evaporator temperature of 10oC, increasing boiler temperature from 110oC to 140oC decreases the entrainment ratio by 66.25%. At the boiler temperature of 120oC, increasing the evaporator temperature from 7.5 to 15 oC increases the entrainment ratio by 65.57%. While at the boiler temperature of 120oC and the evaporator temperature of 10oC, increasing the nozzle throat diameter from 2.4 to 2.8 mm decreases the entrainment ratio by 40%. The numerical results showed that reducing the condenser back pressure or increasing the primary fluid temperature, secondary fluid temperature, and nozzle throat diameter moves the second shock waves in the downstream direction. It could be concluded that the second shock series position detects the ejector operation mode. The ejector runs in critical mode if the second shock series position is close to the diffuser. In contrast, if the second shock series position moves toward the upstream, the ejector runs in subcritical mode.
Nowadays, energy demand continuously rises while energy stocks are dwindling. Using current resources more effectively is crucial for the world. A wide method to effectively utilize energy is to generate electricity using thermal gas turbines (GT). One of the most important problems that gas turbines suffer from is high ambient air temperature especially in summer. The current paper details the effects of ambient conditions on the performance of a gas turbine through energy audits taking into account the influence of ambient conditions on the specific heat capacity ( , isentropic exponent ( ) as well as the gas constant of air . A computer program was developed to examine the operation of a power plant at various ambient temperature
... Show MoreIn this paper, we studied the spark corona discharge in tap and distillited waters. The results show the shape of cone that generated on the tip of capillary tube is different with conductivity of liquids. The blue glow appears at the end of capillary tube and the drop extends into a cone. In addition, the conducitivity is affected on the relationship between the appearance of the blue glow discharge with the applied voltage. The size of the cone decreases with an increase in applied voltage. The cone diameter at the base of capillary tube oscillates with period approximately 1 Sec. this oscillates in the cone diameters is due to the change distance between the liquid electrode and the surface of liquid. The intensity of spark corona dis
... Show MoreLaser-Induced Breakdown Spectroscopy (LIBS) has been documented as an Atomic Emission Spectroscopy (AES) technique, utilising laser-induced plasma, in order to analyse elements in materials (gases, liquids and solid). The Nd:YAG laser passively Q-switched at 1064nm and 9ns pulse duration focused by convex lens with focal length 100 mm to generates power density 5.5×1012 Mw/mm2 with optical spectrum in the range 320-740 nm. Four soil samples were brought from different northern region of Iraq, northern region (Beiji, Sherkat, Serjnar and Zerkary).
The soil of the Northern region of Beige, Sherkat, Serjnar and Zarkary has abundant ratios of the elements P [0.08, 0.09, 0.18, 0.18] and Ca [0.61, 0.15, 0.92, 0.92] while it lack of Si [0.0
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThis study evaluated the structural changes of enamel treated by the Regenerate system and carbon dioxide (CO2) laser against acid challenge. Thirty human enamel slabs were prepared and assigned into three groups: Group I: untreated (control); Group II: treated with the Regenerate system; and Group III exposed to CO2 laser. All specimens were subjected to an acid challenge (pH 4.5–7.0) for 14 days. Specimens were evaluated and compared at 120 points using five Raman microspectroscopic peaks; the phosphate vibrations ν1, ν2, ν3, and ν4 at 960, 433, 1029, and 579 cm−1, respectively, and the carbonate at 1070 cm−1, followed by Vickers microhardness test. The ratio of carbonate to phosphate was correlated to the equivalent mic
... Show More