An experimental and numerical study has been carried out to investigate the forced convection heat transfer by clean or dusty air in a two dimensional annulus enclosure filled with porous media (glass beads) between two vertical concentric cylinders. The outer cylinder is of (82 mm) outside diameters and the inner cylinder of (27 mm) outside diameter. Under steady state condition; the inner cylinder surface is maintained at a high temperature by applying a uniform heat flux and the outer cylinder surface at an ambient temperature. The investigation covered values of input power of (6.3, 4.884, 4.04 and 3.26 W), Reynolds number values of (300, 700, 1000, 1500, and 2000) and dust ratio values (density number N) of (2, 4, 6 and 8). A computer program in MATLAB has been built to carry out the numerical solution by writing the governing equation in finite difference method. The local Nusselt number, the average Nusselt number, the contours of temperature field and velocity field were presented to show the flow and heat transfer characteristics. The results show that when clean air flow, the wall temperature gradually increases along the cylinder length in the direction of flow and decrease as Reynolds number increase while it increases with input power. For dusty air flow results show that the wall
temperature gradually increases along the axial direction and increase with Reynolds number and with input power, and the maximum reduction in heat transfer will be 30 % for N=8 at Re=2000. Comparison was made between the present experimental and numerical results and it gives good agreement. The experimental and numerical Nusselt number follows the same behavior with a mean
deviation of 12%.
This research attempts to shed light on a topic that is considered one of the most important topics of HRMs management, which is the Employee centric approach by examining its philosophy and understanding . To achieve the goal, the research relied on the philosophical analytical method, which is one of the approaches used in theoretical studies. The research reached a set of conclusions, the most important of which are the theoretical studies that addressed this entry in the English language and the lack of it in the Arabic language, according to the researcher's knowledge. The research reached a set of recommendations, the most important of which was that this approach needs more research, analysis and study at the practical and th
... Show MoreThis study aims at describing the identity crisis of Diaspora people (Arab -American) in "Laila Halaby's" novel "Once in A promise Land". Halaby tackles the issues of racism, exclusion, and instability of identity that affect the Arab American community after the terrorist event of eleventh of September. She sheds light on the experiences of her significant characters Salwa and Jassim in America, clarifying how this event weakened their social position and turns their presence in America questionable. "Halaby" describes the bitterness of her characters who are induced into a dream of belonging to a land that transcends their original culture and religious values as well as their language. "Halaby" explains the subsistence in America involvi
... Show MoreMuseum education is of great importance to an appropriate representation of museums’ collections and exhibits, including traditional fashion. Therefore, museum educators/curators need to be equipped with the most essential skills in their profession in order to adequately present the museum’s history and holdings. This could be achieved through specialized training programs. However, Arab countries are still behind in terms of museum education. Therefore, this article aims to shed light on this issue by assessing the knowledge and skills possessed by museum educators/curators and how training programs could affect them
Around fifty isolates of Salmonella enterica serovar Typhi were isolated from blood specimens of patients referring to several hospitals in Kirkuk province, Iraq. The results revealed that all isolates developed resistance to trimethoprim-sulfamethoxazole and chloramphenicol. However, neither sul2 nor tem genes were detected. Moreover, only ten isolates were positive for catP. Our data suggested participation of other genes or mechanisms allow these multidrug isolates to resist the antibiotics in question.
Purpose: The research aims to explore the impact Business Intelligence System (BIS) and Knowledge Conversion Processes (KCP) in the Building Learning Organization (LO) in KOREK Telecom Company in Baghdad city.
Design/methodology/approach: in order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then has tested the search in the telecommunications sector, representatives of one of the telecommunications companies in Baghdad city, has therefore chosen KOREK Telecom company as a sample for research, and the choice was based on the best standard international companies to serve mobile communications in terms o
... Show MoreObjective: To suggest a weighted measure to diagnose the reasons for the low student success ratios in mathematics concerning the third grade of intermediate schools in light of components educational system represented by: [Students, Teachers, Curriculum, and Environmental reasons (others reasons)] assuming differentiated and interrelated components, Also the effectiveness forming of these components according to the gender variable. Methods: Data collection tools were prepared by constructing two questionnaires for each of (Students and Teachers), which included a number of items that involved some domains for studied components of educational system, which demonstrated a high level of validity and reliability in the pilot study, in addi
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the