A numerical investigation has been performed to study the effect of eccentricity on unsteady state, laminar aiding mixed convection in a horizontal concentric and eccentric cylindrical annulus. The outer cylinder was kept at a constant temperature
while the inner cylinder was heated with constant heat flux. The study involved numerical solution of transient momentum (Navier-Stokes) and energy equation using finite difference method (FDM), where the body fitted coordinate system (BFC) was
used to generate the grid mesh for computational plane. The governing equations were transformed to the vorticity-stream function formula as for momentum equations and to the temperature and stream function for energy equation.
A computer program (Fortran 90) was built to calculate the bulk Nusselt number (Nub) after reaching steady state condition for fluid Prandtl number fixed at 0.7 (air) with radius ratio ( =2.6), Rayleigh number (Ra=200), Reynolds number (Re=50) for both concentric and eccentric cylindrical annulus with different eccentricity ratios (ε=0, 0.25, 0.50, 0.75) and angular positions (φo=0o
, 45o , 90o , 135o , 180o ).
The results show a reasonable representation to the relation between Nusselt number and (ε, φo). Generally, Nub decreased with the increase in (ε and φo). Also, results show that the best thermal performance for the inner cylinder was at the angular
position (φo=0o ) for eccentricity ratio (ε=0.25), while the maximum reduction in the rate of heat transfer for the inner cylinder was at the angular position (φo=180o) for eccentricity ratio (ε=0.75).
Comparison of the result with the previous work shows a good agreement.
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreOpenStreetMap (OSM), recognised for its current and readily accessible spatial database, frequently serves regions lacking precise data at the necessary granularity. Global collaboration among OSM contributors presents challenges to data quality and uniformity, exacerbated by the sheer volume of input and indistinct data annotation protocols. This study presents a methodological improvement in the spatial accuracy of OSM datasets centred over Baghdad, Iraq, utilising data derived from OSM services and satellite imagery. An analytical focus was placed on two geometric correction methods: a two-dimensional polynomial affine transformation and a two-dimensional polynomial conformal transformation. The former involves twelve coefficients for ad
... Show MoreCurrently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreA Multiple System Biometric System Based on ECG Data
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
The notion of interval value fuzzy k-ideal of KU-semigroup was studied as a generalization of afuzzy k-ideal of KU-semigroup. Some results of this idea under homomorphism are discussed. Also, we presented some properties about the image (pre-image) for interval~ valued fuzzy~k-ideals of a KU-semigroup. Finally, the~ product of~ interval valued fuzzyk-ideals is established.