Preferred Language
Articles
/
joe-632
Exergy Analysis of a Domestic Refrigerator
...Show More Authors

An energy and exergy thermodynamic analysis using EES program was done for a domestic refrigerator working with R-134a using vapor compression refrigeration cycle. The analysis deals with the system component, i.e. compressor, condenser, evaporator and the expansion device. The analysis depends on the entropy generation minimization approach to improve the refrigerator performance by exploring the optimum design points. These design points were derived from three different theories governing the entropy generation minimization using exergy analyzing method. These theories were first applied to find the optimum balance between the hot inner condenser area and the cold inner evaporator area of the refrigerator and between its hot and cold thermal conductances. Nine types of condensers were used according to its internal surface area and thermal conductance, in order to reach the minimum entropy generation in the refrigerator. The results showed that the compressor has the lowest exergy efficiency of 25%. The expansion device was the second component after the compressor with exergy efficiency of 92%, followed by the condenser with an efficiency of 93%. The evaporator was found to have an exergy efficiency of 98 %. The experimental tests were repeated for the nine condensers sizes with three different ambient temperatures 25℃, 30℃ and 35℃.  The exergy analysis showed that the design of the refrigerator mainly depends on thermal conductance calculations rather than the surface inner area estimation.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 24 2024
Journal Name
Pharmacia
Novel anticoagulants in the management of atrial fibrillation: A comprehensive comparative analysis
...Show More Authors

Background: Atrial fibrillation (AF) stands as the most prevalent cardiac arrhythmia, with associated risks of stroke and systemic thromboembolism. While vitamin K antagonists, specifically warfarin, have historically been the mainstay for stroke prevention in AF, they come with inherent limitations.

Aim: This review seeks to offer a comprehensive analysis of the efficacy, safety, and clinical advantages of novel oral anticoagulants (NOACs) compared to traditional warfarin in AF management.

Method: A meticulous examination of pivotal clinical trials, meta-analyses, and recent research publications was conducted.

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Sun Mar 06 2022
Journal Name
Cogent Arts &humanities
A corpus-based stylistic analysis of online suicide notes retrieved from Reddit
...Show More Authors

.

View Publication
Scopus (10)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Jan 25 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Color Stability of Different Aesthetic Resin Composite Materials: A Digital Image Analysis
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue May 31 2022
Journal Name
Journal Of Positive School Psychology
A GENRE-BASED ANALYSIS OF POLITICAL SPEECHES IN THE UN GENERAL ASSEMBLY
...Show More Authors

Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Journal Of Engineering Research
Design, analysis and development of a proton exchange membrane in fuel cell
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
English Personal Pronouns as a Manipulation Strategy in Political Discourse: A Critical Discourse Analysis
...Show More Authors

Manipulation is a discursive concept which plays a key role in political discourse by which politicians can impose some impact on their recipients through using linguistic features, most prominent of which are personal pronouns (Van Dijk, 1995). The aim of this study is to investigate how politicians utilize the personal pronouns, namely; We and I and their possessive forms as a tool of manipulating the audience's mind based on Van Dijk's  "ideological square" which shows positive-self representation and negative-other representation (Van Dijk,1998:p.69). To this end, American President Donald Trump's 2020 State of the Union speech was chosen to be the data of analysis. Only (8)

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Experimentation in caves painting (A comparative analysis): فريد خالد علوان
...Show More Authors

Addressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Finite Element Analysis for the Damaged Rotating Composite Blade
...Show More Authors

In this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included.  The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap

... Show More
View Publication Preview PDF