Theoretical and experimental investigations have been carried out on developing laminar
combined free and forced convection heat transfer in a vertical concentric annulus with uniformly
heated outer cylinder (constant heat flux) and adiabatic inner cylinder for both aiding and opposing
flows. The theoretical investigation involved a mathematical modeling and numerical solution for
two dimensional, symmetric, simultaneously developing laminar air flows was achieved. The
governing equations of motion (continuity, momentum and energy) are solved by using implicit
finite difference method and the Gauss elimination technique. The theoretical work covers heat flux
range from (200 to 1500) W/m2, Re range from 400 to 2000 and (1.36×105 ≤ Ra ≤ 1.1×107) with
radius ratio of 0.555 which is the same radius ratio used in the experimental part of this study and
Pr=0.7. The experimental work includes construct a rig consists essentially of an annulus with
uniformly heated outer cylinder and adiabatic inner cylinder to give clear insight into heat transfer
process and compare its results with that obtained in theoretical part, the range of the study are
(Re= 383, 724, 1000, 1500) and heat flux equal to (q =370, 422, 588, 980) W/m2. Numerical results
were represented by the temperature profile, axial velocity profile, outer surface temperature and
the distribution of local Nusselt number along the dimensionless axial distance. The velocity and
temperature profile results have revealed that the secondary flow created by natural convection have
significant effects on the heat transfer process. Results reveal also that the experimental local
Nusselt number along the annulus follows the same trend as present theoretical results with mean
difference 10.23 %.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreIn order to activate theatrical discourse aware of the changes imposed by the nature of the contemporary child in terms of stimulating the social skills that achieve a technical and aesthetic convergence between him and theatrical presentation by investing the fact of the existence of the child and its potential in the weaving of stories, and folk in the imagination, and simulation of what corresponds with the characters and icons interact with them through technologies In the light of this research came the following address: (ways to stimulate the skills of the child through a contemporary theatrical speech) where the researcher seeks to delineate the importance involved in the discourse of theater through ways to reach the pillars con
... Show MoreDoubts arise about the originality of a document when noticing a change in its writing style. This evidence to plagiarism has made the intrinsic approach for detecting plagiarism uncover the plagiarized passages through the analysis of the writing style for the suspicious document where a reference corpus to compare with is absent. The proposed work aims at discovering the deviations in document writing style through applying several steps: Firstly, the entire document is segmented into disjointed segments wherein each corresponds to a paragraph in the original document. For the entire document and for each segment, center vectors comprising average weight of their word are constructed. Second, the degree of cl
... Show MoreAbstract
The research aims to build a training program to develop some executive functions for kindergarten children. To achieve this goal, the two researchers built the program according to the following steps:
1. Determining the general objective of the program.
2. Determining the behavioral objectives of the program.
3. Determining the included content in the program.
4. Implementing the content of the activities of the program.
5. Evaluating the Program.
The program included (12) training activities, the training activities included several items: the title of the activity, the time of implementation of the activity, the general objective of the activity, the procedural behavioral objective, the means and tools u
A detailed experimental study was devoted to the anodic oxidation of oxalic acid using manganese dioxide rotating cylinder anode with the objective to evaluate in a systematic way the effect on the oxalic acid oxidation process of several relevant parameters, including the presence of sodium chloride, the current density (J), the rotation speed, the temperature, and the initial concentration of oxalic acid. Thin manganese dioxide film on graphite substrate has been prepared by electrochemical oxidation from MnSO4-H2SO4 electrolyte. The morphology of this electrode was investigated by XRD, SEM, EDS and AFM techniques. The results show that a firm γ-structure of MnO2 film on graphite rod can be obtained successfully. The results indicate tha
... Show MoreIn the petroleum industry, multiphase flow dynamics within the tubing string have gained significant attention due to associated challenges. Accurately predicting pressure drops and wellbore pressures is crucial for the effective modeling of vertical lift performance (VLP). This study focuses on predicting the multiphase flow behavior in four wells located in the Faihaa oil field in southern Iraq, utilizing PIPESIM software. The process of selecting the most appropriate multiphase correlation was performed by utilizing production test data to construct a comprehensive survey data catalog. Subsequently, the results were compared with the correlations available within the PIPESIM software. The outcomes reveal that the Hagedorn and Brown (H
... Show More