Experiments were carried out to investigate natural convection heat transfer in an inclined uniformly heated circular cylinder . The effects of surface heat flux and angle of inclination on the temperature and local Nusselt number variations along the cylinder surface are discussed . The investigation covers heat flux range from 92 W/m² to 487 W/m², and angles of inclination 0° ( horizontal) , 30° , 60° and 90° (vertical) . Results show an increase in the natural convection as heat flux increases and as angle of inclination moves from vertical to horizontal position. An empirical equation of average Nusselt number as a function of Rayliegh number was deduced for each angle of inclination .
Background: Mouthwashes used widely as ancillary to mechanical oral hygiene methods. Little information provided about the effect of mouthwashes on ions released from orthodontic brackets. Therefore, the present study has been established to evaluate the effect of different mouthwashes on the corrosion resistance and the biocompatibility of two brands of brackets. Materials and Methods: Eighty premolar stainless steel brackets were used (40 brackets from each brand). They were subdivided into four subgroups (n=10) according to immersion media (deionized distilled water, Corsodyl, Listerine and Silca herb mouthwashes). Each bracket was stored in a closely packed glass tube filled with 15ml of the immersion media and incubated for 45 days at
... Show MoreInfographics have the capability to organize and display information in a way that is easy for viewers to retrieve and make observations. While infographics have been successful in various fields, their potential benefits in composition writing have not been explored. The primary objective of this study is to investigate the perspectives of Iraqi EFL students who used infographics as an educational technology tool in composition writing, and to identify how gender influences students’ performance when using infographics in EFL writing classes. The significance of this study lies in its integration of infographics as an educational technology tool for teaching writing, aligning with the current trend of technology integration in educati
... Show MoreThe almighty Al-Bari imposed on Muslims easy and accessible worshipers for every individual who is eligible to commission, so whoever performed it rightfully, God rewarded it with the best reward. From the Muslim, the Almighty made the Almighty to the types of acts of worship and acts of righteousness as a reason for the remission of sins that were advanced and late, so I chose a topic (from the hadiths of righteous deeds mentioned in the atonement of sins) as a research drawn from the master’s thesis called (the hadiths of the atoners of sins that were presented and delayed - An analytical study- ), And collect in this research kinds of acts of righteousness that bring the mercy of God Almighty to His servants and be a reason for the
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreCollapse of the vapor bubble condensing in an immiscible is investigated for n-pentane and n-hexane vapors condensing in cold water and n-pentane in two different compositions of glycerin- water mixture. The rise velocity and the drag coefficient of the two-phase bubble are measured.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe deficiency in the nurse staff in the health organizations consider an important problem that must be studied and solved basically , not only because it affect on the health organization and it's strategic goals , but also it affect the human being and it's health which can't be substituted with anything or delayed in it's treatment ,This research aims to necessary for health organizations to strategically help in maintaining the nurse staff and to keep that in it's strategic orientation and it's mission , moreover , the health organizations must study the reality of the nurse in the health organizations and know the causes beyond leaving the nurse staff the nurse job , and then remove
... Show More