Almost all thermal systems utilize some type of heat exchanger. In a lot of cases, evaporators are important for systems like organic Rankine cycle systems. Evaporators give a share in a large portion of the capital cost, and their cost is significantly attached to their size or transfer area. Open-cell metal foams with high porosity are taken into consideration to enhance thermal performance without increase the size of heat exchangers. Numerous researchers have tried to find a representation of the temperature distribution closer to reality due to the different properties between the liquid and solid phases. Evaporation heat transfer in an annular pipe of double pipe heat exchanger (DPHEX) filled with cooper foam is investigated numerically with utilizing the local thermal non-equilibrium (LTNE) model. Warm water with constant inlet conditions flows in the inner pipe while R143a is used as cooling fluid in the annular pipe. The effects of pores per inch (PPI), mass flux of R134a and copper foam porosity on solid and fluid temperatures, liquid saturation and heat transfer coefficient are analysed and illustrated. Forchheimer-extended Darcy flow model is utilized with the adopting of the two-phase mixture model (TPMM). The governing equations in two-dimensional steady state regime were written in LTNE model. These equations were discretized using the finite volume method and a MATLAB program was built to solve these equations with its initial and boundary conditions. The obtained data illustrates that LTNE effect in metal foam is important for lower porosity, lower pore density and higher mass flux. The ratio of liquid will arrive its lowest value at the outlet, and it decreases with PPI increase and it increases with porosity and mass flux increase. The mean heat transfer coefficient approximately doubled when PPI increased from 10 to 50 and it increased by 70% when porosity decreased from 0.95 to 0.85.
Let R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.
In this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreAbstract
Research title: The legal ruling of advice.
This research deals with the topic of advice, as the research included the following:
Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.
The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or dislike
... Show MoreThis paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
This paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.
In this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.
Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
Let R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if
the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are introduced and given some properties .
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More