The efficiency of internal combustion engines (ICE) is usually about thirty percent of the total energy of the fuel. The residual energy is lost in the exhaust gas, the lubrication, and the cooling water in the radiators. Recently much of the researcher’s efforts have focused on taking advantage of wasted energy of the exhaust gas. Using a thermoelectric generator (TEG) is one of the promising ways. However, TEG depends entirely on the temperature difference, which may be offered by the exhaust muffler. An experimental test has been conducted to study the thermal performance of a different muffler internal design. The researchers resort to the use of lost energy in an ICE using TEG, which is one of the ways to take advantage of energy lost, which depends on the difference in temperature. TEG needs a heat exchanger and the muffler one of its types. In this work, four different types of mufflers will be designed and studied. The results showed that the thermal performances of the studied models compared to the empty cavity were as follows, the serial plate structure 56.11%, the central Box structure 52.73%, and the central curvature structure 29.61%. The highest thermal performance is on the serial plate structure relative to the other types.
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreIn this paper, a least squares group finite element method for solving coupled Burgers' problem in 2-D is presented. A fully discrete formulation of least squares finite element method is analyzed, the backward-Euler scheme for the time variable is considered, the discretization with respect to space variable is applied as biquadratic quadrangular elements with nine nodes for each element. The continuity, ellipticity, stability condition and error estimate of least squares group finite element method are proved. The theoretical results show that the error estimate of this method is . The numerical results are compared with the exact solution and other available literature when the convection-dominated case to illustrate the effic
... Show MoreSeepage occurs under or inside structures or in the place, where they come into contact with the sides under the influence of pressure caused by the difference in water level in the structure U / S and D / S. This paper is designed to model seepage analysis for Kongele (an earth dam) due to its importance in providing water for agricultural projects and supporting Tourism sector. For this purpose, analysis was carried out to study seepage through the dam under various conditions. Using the finite element method by computer program (Geo-Studio) the dam was analysed in its actual design using the SEEP / W 2018 program. Several analyses were performed to study the seepage across Kongele
Dielectric barrier discharges (DBD) can be described as the presence of contact with the discharge of one or more insulating layers located between two cylindrical or flat electrodes connected to an AC/pulse dc power supply. In this work, the properties of the plasma generated by dielectric barrier discharge (DBD) system without and with a glass insulator were studied. The plasma was generated at a constant voltage of 4 kV and fixed distance between the electrodes of 5 mm, and with a variable flow rate of argon gas (0.5, 1, 1.5, 2 and 2.5) L/min. The emission spectra of the DBD plasmas at different flow rates of argon gas have been recorded. Boltzmann plot method was used to calculate the plasma electron temperature (Te), and Stark broadeni
... Show MoreAim of the study: This study's goal was to determine how laser surface alteration affected wettability of injectable thermoplastic acrylic and heat cure acrylic denture base materials. Materials and methods: Injectable thermoplastic acrylic resin (Deflex) and heat cure acrylic (Procryla) were used in this study to produce forty-disc shaped specimens, 20 specimens for each material type. The control group was made up of ten samples of each type of plastic denture base material. The other ten samples were treated with a nano-pulse fiber-optic lens Nd:YAG laser. The results were looked at with the Kruskal-Wallis test and the unpaired t-test (a=.05). Results: Compared to the control groups, the laser-treated groups were more likely to sti
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MorePleomorphic adenoma (PA) is the most frequent benign epithelial neoplasm of salivary glands, displaying a remarkable degree of morphological variety. The aim of the study is to illustrate the clinicopathological characteristics of PA with particular emphases on epithelial cell morphology and mesenchymal elements. Materials and Methods: A total of 132 PA collected between 2002 and 2017 were recruited from Al Shahid Ghazi Al Hariri Hospital and the Department of Oral Pathology, College of Dentistry, Baghdad University, Baghdad, Iraq, and analyzed for their demographic and histopathological features. All data were analyzed using descriptive statistics. A slightly higher incidence of PA was detected in females (52.3%) compared to male subject
... Show More
Facing industrial companies many pressures and challenges due to rapid changes in the business environment of contemporary, which requires them to do their performance look more inclusive rather than limiting performance evaluation on the financial perspective in spite of its importance, prompting companies to rethink their reality competitive through the adoption of methodologies and new philosophies to manage competitiveness of total quality management, and re-engineering of production processes, and knowledge management,... etc., as This study framework cognitive and practical "to evaluate the performance of a company Diyala General Electric Industries and how to rehabilitate
According to Chandra Survey Observatory Near-Asteroid Belt Comets, the solar wind's contact with the comet produces a variety of spectral characteristics. The study of X-ray spectra produced by charge exchange is presented here. The spectrum of a comet can reveal a lot about its composition. This study has concentrated on the elemental abundance in six different comets, including 17P/Holmes, C/1999T1, C/2013A1, 9p/Temple1, and 103p/Hartley2 (NEAT). Numerous aspects of the comet's dynamics allow it to behave in a unique manner as it gets closer to the Near-Asteroid Belt. These characteristics are being examined, and some studies are still ongoing. The computations allow us to observe, for instance, how the composition of
... Show More