A detailed methodology is presented in this paper for the calculation of nucleate boiling safety margin (NBSM) in nuclear research reactors using a temperature function with three different thermal-hydraulic hot-spot analyses: nominal, cumulative and statistical for normal operating condition and coolant flow variation. A computer simulation program is developed for applying the methodology to the IRT-5000 reactor based on experimental core data. According to cumulative analysis as the overconservative approach, the NBSM at normal operating condition of thermal power 5 MW and coolant velocity 1.672 m/s was 2.3% with reactor power limit 5.13 MW. However, during power or coolant flow trip condition, transient nucleate boiling would occur for short period at reactor shutdown. Of great importance, variation of NBSM with reactor operating condition for the different hot-spot analyses is found to be of strong linear correlation such that one analysis is sufficient to specify the results of the other analyses.
Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s
... Show MoreObjective of the study was to rate and analyze the physical fitness of female students from Iraq and Russia to find similarities, differences and regularities. Sampled for the study were 44 female non-sporting students: 20 students from Pedagogical University in Bagdad; and 24 students from Russian State University of Physical Education, Sport, Youth and Tourism in Moscow. The study was designed to obtain the joints flexibility, coordination, speed-strength and static endurance rates. The Iraqi students were tested with higher coordination abilities than their Russian peers, whilst the latter were ranked higher in the speed-strength, shoulder joints and spine flexibility tests, albeit lower than their Iraqi peers in the hip flexibility test
... Show MoreThe applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana
... Show MoreThis work is concerned with building a three-dimensional (3D) ab-initio models that is capable of predicting the thermal distribution of laser direct joining processes between Polymethylmethacrylate (PMMA) and stainless steel 304(st.st.304). ANSYS® simulation based on finite element analysis (FEA) was implemented for materials joining in two modes; laser transmission joining (LTJ) and conduction joining (CJ). ANSYS® simulator was used to explore the thermal environment of the joints during joining (heating time) and after joining (cooling time). For both modes, the investigation is carried out when the laser spot is at the middle of the joint width, at 15 mm from the commencement point (joint edge) at traveling time of 3.75 s. Process par
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreAddressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreReflection cracking in asphalt concrete (AC) overlays is a common form of pavement deterioration that occurs when underlying cracks and joints in the pavement structure propagate through an overlay due to thermal and traffic-induced movement, ultimately degrading the pavement’s lifespan and performance. This study aims to determine how alterations in overlay thickness and temperature conditions, the incorporation of chopped fibers, and the use of geotextiles influence the overlay’s capacity to postpone the occurrence of reflection cracking. To achieve the above objective, a total of 36 prism specimens were prepared and tested using an overlay testing machine (OTM). The variables considered in this study were the thickness of the
... Show More