Preferred Language
Articles
/
joe-235
Numerical Study of Heat Transfer Enhancement in Heat Exchanger Using AL2O3 Nanofluids
...Show More Authors

In this study, the flow and heat transfer characteristics of Al2O3-water nanofluids for a range of the Reynolds number of 3000, 4500, 6000 and 7500 with a range of volume concentration of 1%, 2%, 3% and 4% are studied numerically. The test rig consists of cold liquid loop, hot liquid loop and the test section which is counter flow double pipe heat exchanger with 1m length. The inner tube is made of smooth copper with diameter of 15mm. The outer tube is made of smooth copper with diameter of 50mm. The hot liquid flows through the outer tube and the cold liquid (or nanofluid) flow through the inner tube. The boundary condition of this study is thermally insulated the outer wall with uniform velocity at (0.2, 0.3, 0.4 and 0.5 m/s) at the cold loop and constant velocity at (0.5 m/s) at the hot loop.

The results show that the heat transfer coefficient and Nusselt number increased by increasing Reynolds number and particle concentration. Numerical results indicate that the maximum enhancement in Nusselt number and heat transfer coefficient were 9.5% and 13.5% respectively at Reynolds number of 7100 and particles volume fraction of 4%. Results of nanofluids also showed a good agreement with the available empirical correlation at particles volume fractions of 1%, 2% and 3%, but at volume fractions of 4% a slight deviation is obtained.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of Fractional Hold-Up in RDC Column Using Artificial Neural Network
...Show More Authors

In the literature, several correlations have been proposed for hold-up prediction in rotating disk contactor. However,
these correlations fail to predict hold-up over wide range of conditions. Based on a databank of around 611
measurements collected from the open literature, a correlation for hold up was derived using Artificial Neiral Network
(ANN) modeling. The dispersed phase hold up was found to be a function of six parameters: N, vc , vd , Dr , c d m / m ,
s . Statistical analysis showed that the proposed correlation has an Average Absolute Relative Error (AARE) of 6.52%
and Standard Deviation (SD) 9.21%. A comparison with selected correlations in the literature showed that the
developed ANN correlation noticeably

... Show More
View Publication Preview PDF
Publication Date
Sat May 30 2020
Journal Name
Neuroquantology
Desertification Monitoring in the South-West of Iraqi Using Fuzzy Inference System
...Show More Authors

In this research, the region in the south-west of Iraq is classified using a fuzzy inference system to estimate its desertification degree. Three land cover indices are used which are the Normalized Difference Vegetation Index, Normalized Multi-Band Drought Index and the top of atmosphere surface temperature to build a fuzzy decision about the desertification degree using eight decision roles. The study covers a temporal period of 38 years, where about every 10 years a sample is elected to verify the desertification status of the region, starting from 1990 to 2018. The results show that the desertification status varied every 10 years, wherein 2000 encountered the highest desertification in the south-west of Iraq.

View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Baghdad College Of Dentistry
In Vitro Comparative Assessment of Composite Nanoleakage Using Various Dentine Surface Treatments
...Show More Authors

Background: The treatment of dental tissues proceeding to adhesive procedures is a crucial step in the bonding protocol and decides the clinical success ofrestorations. This study was conducted in vitro, with the aim of evaluating thenanoleakage on the interface between the adhesive system and the dentine treated by five surface modalities using scanning electron microscopy and energydispersiveX-ray spectrometry. Materials and methods: Twenty five extracted premolars teeth were selected in the study. Standardized class V cavities were prepared on the buccal and lingual surfaces then the teeth divided into five main groups of (5 teeth in each group n=10) according to the type of dentine surface treatment that was used: Group (A): dentine was

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Prediction of Cutting Force in Turning Process by Using Artificial Neural Network
...Show More Authors

       

Cutting forces are important factors for determining machine serviceability and product quality. Factors such as speed feed, depth of cut and tool noise radius affect on surface roughness and cutting forces in turning operation. The artificial neural network model was used to predict cutting forces with related to inputs including cutting speed (m/min), feed rate (mm/rev), depth of cut (mm) and work piece hardness (Map). The outputs of the ANN model are the machined cutting force parameters, the neural network showed that all (outputs) of all components of the processing force cutting force FT (N), feed force FA (N) and radial force FR (N) perfect accordance with the experimental data. Twenty-five samp

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Protection of Galvanized steel from corrosion in salt media using sulfur nanoparticles
...Show More Authors

                The characteristics of sulfur nanoparticles were studied by using atomic force microscope (AFM) analysis. The atomic force microscope (AFM) measurements showed that the average size of sulfur nanoparticles synthesized using thiosulfate sodium solution through the extract of cucurbita pepo extra was 93.62 nm. Protecting galvanized steel from corrosion in salt media was achieved by using sulfur nanoparticles in different temperatures. The obtained data of thermodynamic in the presence of sulfur nanoparticles referred to high value as compares to counterpart in the absence of sulfur nanoparticles, the high inhibition efficiency (%IE) and corrosion resistance were at high temperature, the corrosion rate or weig

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Mar 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Indirect Spectrophotometric Determination of Oxymetazoline Hydrochloride in Pharmaceutical Formulation Using Fluorophotometric Method
...Show More Authors

This research involves an indirect Fluorophotometric method for the determination of microgram amount of oxymetazoline hydrochloride in the concentration range 0.1-5.0 g/ml. The method is based on the oxidation of the drug by cerium sulphate solution which is acidic medium where Ce IV is reduced to Ce III which can be excited at 259 nm to give an emitted light at 377 nm which  is directly proportional to the concentration of Ce III which is equivalent to Ce IV that is needed to oxidize the studied drug. The average recovery of the method is 100.19% and relative standard deviation (RSD) < 0.37% . The method have been successfully applied to the determination of the studied drug in its pure and pharmaceutical preparations and it wa

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant b

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Using the plastic wastes in fabrication of composite materials for different applications
...Show More Authors

This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV

... Show More
View Publication Preview PDF
Crossref (1)
Crossref