Theoretical and experimental investigations of the transient heat transfer parameters of constant heat flux source subjected to water flowing in the downward direction in closed channel are conducted. The power increase transient is ensured by step change increase in the heat source power. The theoretical investigation involved a mathematical modeling for axially symmetric, simultaneously developing laminar water flow in a vertical annulus. The mathematical model is based on one dimensional downward flow. The boundary conditions of the studied case are based on adiabatic outer wall, while the inner wall is subjected to a constant heat flux. The heat & mass balance equation derived for specified element of bulk water within the annulus and solved by using Laplace method to
determine the variation of bulk water temperature. The experimental investigation included a set of experiments carried out to investigate the temperature variation along the heat source for power increase transient of (5%, 10%, 15% and 20%) of its nominal value during and after reaching the steady state condition. Estimation of the boiling safety factor is predicted and compared with the theoretical values. Reliable agreement between experimental and theoretical approaches is reached. The later showed that the elapsed time required for the clad surface temperature to reach its steady state values after each transient is less than that related to bulk water temperature. New correlation for prediction of critical heat flux, CHF based on inlet water temperature and water mass flux are investigated and compared with CHF correlations obtained from previous researches. Specific recommendations concerned with preventive measured required to eliminate the effect of boiling crisis are concluded based on theoretical and experimental results related to transients setting times obtained from each case study.
The research aims to answer the questions that revolve in the mind of mankind about how to create creation, how it existed prior to creation, who created existence, and the characteristics of that presence. The researcher also wanted to show that the culture of Imam Ali (peace be upon him) In the book of Adam, peace be upon him, God has punished Adam (peace be upon him) for not having sinned. Because his wife is the one who fed him the fruit of the tree, and this is contrary to what was stated in the sermon of Imam (peace be upon him) who Z Adam (peace be upon him) is the one who trusted Satan and Gwighth.We note that the approach of the rhetoric has pointed to the creation of angels and did not refer to the creation of Eve and the class
... Show MoreThin films of ZnSe arc deposited on glass substrates by thermal evaporation in vacuum with different thickness (1000, 2700, 4000) A° temperature (293-373) °K are studies the electrical properties before and after annealing. The result show decrease D.0 conductivity and increasing the activation energy Eat.
The research aims to answer the questions that revolve in the mind of mankind about how to create creation, how it existed prior to creation, who created existence, and the characteristics of that presence. The researcher also wanted to show that the culture of Imam Ali (peace be upon him) In the book of Adam, peace be upon him, God has punished Adam (peace be upon him) for not having sinned. Because his wife is the one who fed him the fruit of the tree, and this is contrary to what was stated in the sermon of Imam (peace be upon him) who Z Adam (peace be upon him) is the one who trusted Satan and Gwighth.
We note that the approach of the rhetoric has pointed to the creation of angels and did not refer to
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThis article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreHigh performance work systems and general industrial enterprise performance
In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/
... Show MoreThe research tagged (functional enhancement and its reflection on industrial product systems) focused on the possibility of enhancing industrial products in terms of form and functionality in a way that they are able to meet the needs of the user through the impact of technology and modern technologies on the functional enhancement of industrial products and their effectiveness in achieving formal and functional design variables, and producing products Industrial products are highly efficient and durable in order to improve them in order to meet the needs of the user, the transfer of technology between life forms and industrial products is desirable because the functional enhancement processes that occurred in general on industrial produ
... Show More