An experimental and numerical study has been carried out to investigate the heat transfer by natural convection in a three dimensional annulus enclosure filled with porous media (silica sand) between two inclined concentric cylinders with (and without) annular fins attached to the inner cylinder under steady state condition; The experiments were carried out for a range of modified Rayleigh number (0.2 ≤Ra*≤ 11) and extended to Ra* =500 for numerical study, annulus inclination angle of (δ = 0˚, 30˚, 60˚ and 90˚). The numerical study was to write the governing equation under an assumptions used Darcy law and Boussinesq’s approximation and then solved numerically using finite difference approximation. It was found that the average Nusselt number depends on (Ra*, Hf, δ and Rr) and the maximum value of the local Nusselt number for vertical cylinder is about two times as large as that of the horizontal case. The results showed that, increasing of fin length increases the heat transfer rate for any fins pitch unless the area of the inner cylinder exceeds that of the outer one, then the heat will be stored in the porous media. A correlation for Nu in terms of Ra, Rr and δ, has been developed for inner cylinder. A comparison was made between the results of the present work and with other researches for the case without fins and excellent agreement was obtained and reveals deviation less than 5 % for average Nusselt number.
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreIn spite of the disappearing of a clear uniform textbook for teaching ESP at different departments and different colleges in both scientific and humanistic studies, the practitioners at those departments and colleges have to teach translation as one of the important requirements to pass the English language exam. The lack of defined translation activities is a noticeable problem therefore; the problem of teaching translation is diagnosed in that the students lack the ability to comprehend the text in English language and other translation knowledge and skills.
The study aims to suggest a translation strategy and then find out the effect of the translation strategy on ESP learners’ achievement in translation. A sample of 50 stud
... Show MoreAsthma is a chronic respiratory disorder in which immunological and structural cells play a role. The limits of conventional medicines necessitate the development of innovative therapeutic techniques for asthma. In the present study, we investigated the possible protective effect of cinnamic acid (CA) on ovalbumin-induced asthma in a mouse model. Sixty albino male mice BALB/c type weighing (20-30) grams were chosen at random and divided into five groups each one contains 12 animal: Group I: PBS/liquid paraffin control. Group II: asthma model group. Group III: cinnamic acid control group; mice received cinnamic acid (50 mg/kg) in liquid paraffin orally by gavage. Group IV: asthma model / group of (25 mg / kg) cinnamic acid; mice received
... Show MoreThe current study aims to determine the extent of SOMO's interest in governance and whether this interest is sufficient to be reflected in enhancing its organizational reputation, and the field of research was in the oil marketing company SOMO. (109), (105) questionnaires were distributed, (94) forms and (11) forms were not retrieved, and the valid questionnaires had reached (91). The analytical and descriptive approach was used for the study, and the current research has found a positive impact of government on the reputation of the organization, and this research demonstrated the existence of the proposed relationship and the impact between governance and the reputation of the organization.
The research aim is to identify the concept of fair value and its measurement approaches, shed light on the concept of fraud and its forms, motives, as well as how to identify fraud under the fair value method.
I have been using the program package SSPS statistical in the calculation of the research variables, and the research sample was a group of university professors and auditors working in the federal board of Supreme Audit.
The researcher has reached some conclusions, the most important; the lack of conclusive evidence about management's intent in adopting the use of fair value raises several doubts about the credibility of the statements prepared in under the fa
... Show MoreThe main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreA Field experiment was conducted in Horticulture and Landscape Department, College of Agricultural Engineering Sciences, University of Baghdad, Al-Jadriah during fall 2019-2020 to study changes in the growth and yield of broccoli grown in the alternative solution ABEER, affected by gas enrichment and spraying with coconut water and moringa aqueous extract under the hydroponic cultivation system. Nested design with three replications adopted in the experiment, each of them included in main plot the first factor, which is gas enrichment (O2 and O3), Then levels of second factor were randomly distributed within each replicate, which included spra