An experimental and numerical study has been carried out to investigate the forced convection heat transfer by clean or dusty air in a two dimensional annulus enclosure filled with porous media (glass beads) between two vertical concentric cylinders. The outer cylinder is of (82 mm) outside diameters and the inner cylinder of (27 mm) outside diameter. Under steady state condition; the inner cylinder surface is maintained at a high temperature by applying a uniform heat flux and the outer cylinder surface at an ambient temperature. The investigation covered values of input power of (6.3, 4.884, 4.04 and 3.26 W), Reynolds number values of (300, 700, 1000, 1500, and 2000) and dust ratio values (density number N) of (2, 4, 6 and 8). A computer program in MATLAB has been built to carry out the numerical solution by writing the governing equation in finite difference method. The local Nusselt number, the average Nusselt number, the contours of temperature field and velocity field were presented to show the flow and heat transfer characteristics. The results show that when clean air flow, the wall temperature gradually increases along the cylinder length in the direction of flow and decrease as Reynolds number increase while it increases with input power. For dusty air flow results show that the wall
temperature gradually increases along the axial direction and increase with Reynolds number and with input power, and the maximum reduction in heat transfer will be 30 % for N=8 at Re=2000. Comparison was made between the present experimental and numerical results and it gives good agreement. The experimental and numerical Nusselt number follows the same behavior with a mean
deviation of 12%.
A pseudo-slug flow is a type of intermittent flow characterized by short, frothy, chaotic slugs that have a structure velocity lower than the mixture velocity and are not fully formed. It is essential to accurately estimate the transition from conventional slug (SL) flow to pseudo-slug (PSL) flow, and from SL to churn (CH), by precisely predicting the pressure losses. Recent research has showed that PSL and CH flows comprise a significant portion of the conventional flow pattern maps. This is particularly true in wellbores and pipelines with highly deviated large-diameter gas-condensate wellbores and pipelines. Several theoretical and experimental works studied the behavior of PSL and CH flows; however, few models have been suggested to pre
... Show MoreThis paper aimed to investigate the effect of the height-to-length ratio of unreinforced masonry (URM) walls when loaded by a vertical load. The finite element (FE) method was implemented for modeling and analysis of URM wall. In this paper, ABAQUS, FE software with implicit solver was used to model and analysis URM walls subjected to a vertical load. In order to ensure the validity of Detailed Micro Model (DMM) in predicting the behavior of URM walls under vertical load, the results of the proposed model are compared with experimental results. Load-displacement relationship of the proposed numerical model is found of a good agreement with that of the published experimental results. Evidence shows that load-displacement curve obtained fro
... Show MoreSocial Aspects in the Kingdom of Mali Through Ibn Battuta's book Tuhfat Alnuddar in Garaeb Al Amsar Wa Ajaeb Al Asfar
The research focuses on the withdrawal of the United States from the nuclear agreement signed between the permanent members of the United Nations Security Council and the Islamic Republic of Iran concerning its nuclear program. This withdrawal has caused disruption in the official media discourse of the concerned countries. Therefore, the main question can be posed: Are there differences in the positions of countries related to the nuclear agreement, as well as those countries affected by it, before and after the official withdrawal of the United States on May 8, 2018?
The research aims to shed light on the trends in media discourse of the countries that signed the nuclear agreement and those affected by it b
Mixing this strategy with a qualitative research design and an idea known as AI-supported journalism, the paper is going to approach the requirements of how AI technologies may transform journalism content and culture in a way beyond what one anticipates; therefore, enabling more of it to reach an audience. The current research used descriptive research design to investigate the potential applications of the AI tools that mediate civilizational conversation and a structured questionnaire to media professionals. AI-driven journalism can promote peaceful cohabitation and mutual respect and thus act as a bridge between cultures, the research said. The piece even goes on to mention the need for media establishments and civil soc
... Show MoreThe prediction of the blood flow through an axisymmetric arterial stenosis is one of the most important aspects to be considered during the Atherosclrosis. Since the blood is specified as a non-Newtonian flow, therefore the effect of fluid types and effect of rheological properties of non-Newtonian fluid on the degree of stenosis have been studied. The motion equations are written in vorticity-stream function formulation and solved numerically. A comparison is made between a Newtonian and non-Newtonian fluid for blood flow at different velocities, viscosity and Reynolds number were solved also. It is found that the properties of blood must be at a certain range to preventing atheroscirasis
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More