In this study, the effect of intersecting ribs with inclined ribs on the heat transfer and flow characteristics of a high aspect ratio duct has been numerically investigated. The Relative roughness pitch (P/e) is 10 and the Reynolds number range from 35,700 to 72,800. ANSYS (Fluent-Workbench 18.0) software has been utilized to solve the Reynolds averaged Navier-Stokes (RANS) equations with the Standard k-ε turbulence model. Three ribbed models have been used in this study. Model 1 which is a just inclined ribs, Model 2 which has a single longitudinal rib at the center with inclined ribs and Model 3 which has two longitudinal ribs at the sides. The results showed that the heat transfer rate has been enhanced when the intersecting ribs are used. Model 3 has achieved the highest overall thermal performance. The increasing in Nusselt number ratio (Nu /Nus ) for Model 3 and 2, relative to Model 1, are 13.19% and 7.03%, respectively. Consequently, the hybridizing by intersecting ribs with inclined ribs is considered as an advantageous technique to enhance the heat transfer.
Adsorption of Acetone and 2-Butanone on Iraqi siliceouns rocks powder have been investigated. UV technique has been used to determine the adsorption isotherms. The results showed that the adsorption isotherms obeyed Freundlich adsorption equation. The results showed that the adsorption increases with increasing acidity of solutions. The adsorption was exothermic process, increasing temperature leads to decreasing adsorption. H, S, G were calculated
This work consists of a numerical simulation to predict the velocity and temperature distributions, and an experimental work to visualize the air flow in a room model. The numerical work is based on non-isothermal, incompressible, three dimensional, k turbulence model, and solved using a computational fluid dynamic (CFD) approach, involving finite volume technique to solve continuity, momentum and energy equations, that governs the room’s turbulent flow domain. The experimental study was performed using (1/5) scaled room model of the actual dimensions of the room to simulate room air flow and visualize the flow pattern using smoke generated from burnt herbs and collected in a smoke generator to delivered through
... Show MoreThe adsorption of Malonic acid, Succinic acid, Adipic acid, and Azelaic acid from their aqueous solutions on zinc oxide surface were investigated. The adsorption efficiency was investigated using various factors such as adsorbent amount, contact time, initial concentration, and temperature. Optimum conditions for acids removal from its aqueous solutions were found to be adsorbent dose (0.2 g), equilibrium contact time (40 minutes), initial acids concentration (0.005 M). Variation of temperature as a function of adsorption efficiency showed that increasing the temperature would result in decreasing the adsorption ability. Kinetic modeling by applying the pseudo-second order model can provide a better fit of the data with a greater correla
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreGiven the paucity and toxicity of available drugs for leishmaniasis, coupled with the advent of drug resistance, the discovery of new therapies for this neglected tropical disease is recognised as being of the utmost urgency. As such antimicrobial peptides (AMPs) have been proposed as promising compounds against the causative Leishmania species, insect vector-borne protozoan parasites. Here the AMP temporins A, B and 1Sa have been synthesised and screened for activity against Leishmania mexicana insect stage promastigotes and mammalian stage amastigotes, a significant cause of human cutaneous disease. In contrast to previous studies with other species the activity of these AMPs against L. mexicana amastigotes was low. This suggests that ama
... Show MoreBackground: The aims of this study were to evaluate the effect of implant site preparation in low-density bone using osseodensification method in terms of implant stability changes during the osseous healing period and peri-implant bone density using CBCT. Material and methods: This prospective observational clinical study included 24 patients who received 46 dental implants that were installed in low-density bone using the osseodensification method. CBCT was used to measure the bone density pre- and postoperatively and implant stability was measured using Periotest® immediately after implant insertion and then after 6 weeks and 12 weeks postoperatively. The data were analyzed using paired t-test and the probability value <0.05 was conside
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
The food web is a crucial conceptual tool for understanding the dynamics of energy transfer in an ecosystem, as well as the feeding relationships among species within a community. It also reveals species interactions and community structure. As a result, an ecological food web system with two predators competing for prey while experiencing fear was developed and studied. The properties of the solution of the system were determined, and all potential equilibrium points were identified. The dynamic behavior in their immediate surroundings was examined both locally and globally. The system’s persistence demands were calculated, and all conceivable forms of local bifurcations were investigated. With the aid of MATLAB, a numerical simu
... Show More