Transient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure sinusoidal amplitude range and time period values of . Numerical results show that the pressure contours lines are influenced by hydrostatic head variation and not affected with the sinusoidal amplitude and time period variation. It is found that the average Nusselt number decreases with time and pressure head increasing and decreases periodically with time and amplitude increasing. The time averaged Nusselt number decreases with imposed sinusoidal amplitude and cycle time period increasing.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
This study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity. The capability of mixed bacterial culture was examined to remediate the diesel-contaminated soil in bio piling system. For fast ex-situ treatment of diesel-contaminated soils, the bio pile system was selected. Two pilot scale bio piles (25 kg soil each) were constructed containing soils contaminated with approximately 2140 mg/kg total petroleum hydrocarbons (TPHs). The amended soil:
... Show MoreThe quote of a Canadian communication scientist (Marshall McLuhan) (“The world has become an electronic village”) has become an archaic information compared to the great and rapid development of communication in the last two decades of the 20th century and what will happen later in the 21st century, to the extent that the world is called, thanks to the internet, a “Small screen” and this fact is a sign of the great progress that has been made in this field. As for the other statement of the Canadian communication scientist mentioned before “the medium itself, is the message”, it has been renewed and developed in its meaning and it’s purpose. Each new technical development in the means of communication necessarily means a me
... Show More
The current study aims to identify agreeableness and orientation towards voluntary work of officials in public facilities, as well as to identify the nature of the correlation between agreeableness and orientation towards voluntary work of officials in public facilities. To achieve the aims of the research, the researchers designed the agreeableness scale, which consists of (28) items in its final form. The researchers also built a scale of orientation towards voluntary work, which consists of (29) items in its final form. Psychometric properties of validity and reliability of the two scales were extracted in various ways. The researcher applied the two scales on a sample of (400) officials, the results indicated that the
... Show MoreSituational regret and its relation to the vitality of conscience among university students The research seeks to identify situational regret and its relation to the vitality of conscience among university students, identify the significant differences in regard with students’ gender, and identify if there is a correlation between situational regret and the vitality of conscience. To do this, two scales were adopted; one to measure situational regret consisted of (31) items, which was designed by (Al-badrani, 2006), besides, costa and macrys’ (1992) scale that translated in Arabic language by (Al-qaisy, 2013). It composed of (35) items. Total of (120) male and female students were collected from three-different colleges (science, art
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
KE Sharquie, MM Al-Waiz, AA Noaimi, Iraqi Postgraduate Medical Journal, 2008 - Cited by 1
Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreAbstract:
Objectives: This study aims to (1) find out the association between patients' age, years of getting the disease, and their spiritual coping ability, and (2) investigate the differences in illness perception and spiritual coping ability between gender groups, level of education groups, monthly income groups, residence groups and satisfaction with health services groups.
Methodology
A descriptive correlational design is used in this study. The study sample includes a convenience sample of (158) patients with chronic kidney failure.
The study instrument consists of two parts; the first one focuses on participants’ sociodemographic characteristics, and the second part deals with participants’ spiritual coping by us