Research Article | Open Access | Download PDF
Volume 73 | Issue 11 | Year 2025 | Article Id. IJETT-V73I11P113 | DOI : https://doi.org/10.14445/22315381/IJETT-V73I11P113Heat Flow Analysis in Corrugated Plate Heat Exchanger using MWCNT Nanofluid at Various Corrugated Angles, Volume Flow Rate, Phi
K N V Sreedevi, Somanchi Naga Sarada
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 07 Jul 2025 | 01 Nov 2025 | 10 Nov 2025 | 25 Nov 2025 |
Citation :
K N V Sreedevi, Somanchi Naga Sarada, "Heat Flow Analysis in Corrugated Plate Heat Exchanger using MWCNT Nanofluid at Various Corrugated Angles, Volume Flow Rate, Phi," International Journal of Engineering Trends and Technology (IJETT), vol. 73, no. 11, pp. 165-172, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I11P113
Abstract
A comprehensive Study investigates thermal performance in a Corrugated Wavy plate heat exchanger utilizing Multi-Walled Carbon Nanotube (MWCNT)-based nanofluids, with a focus on the combined effects of flow-rate, nano-particle concentration, and corrugation angle on efficiency. Experiments were conducted across varying flow rates (2–4 LPM), MWCNT concentrations, phi (∅, 0,0.01,0.03,0.05,0.07,0.09%), and plate angles (0°–60°) to evaluate their individual and synergistic impacts on heat transfer. The results show that an increase in Volume Flow Rate(lpm) increases both heat transfer rate, Q(Watts), and pressure drop (Pascal). Elevating nanoparticle concentration to 0.09% leads to increased heat transfer rate and unwanted pressure drop. Inclination angle markedly influences performance, with optimal(maximal) heat-transfer-rate at 40 ° with optimal(minimal) pressure-drop at 0 ° inclination angle. Corrugated angle, lpm, nanoparticle concentration elevates Q at the cost of pressure drop. An attempt is made to find optimum parameters that enhance the heat transfer rate and reduce the pressure drop. With water as test fluid, maximum HTR is 2060.847W at 30o ° cphe’ angle, at 3lpm. For MWCNT nanofluid as test fluid, max HTR is 2431.613W at 50o ‘cphe ‘angle,4lpm. An 18% increase in HTR is observed. Minimum pressure drop is 7.328871pascal at 0o,2 lpm with water as test fluid, and 7.49995 pascal at 0.01% phi,2lpm at 0 ° corrugated angle with nanofluid as test fluid. Pressure drop almost remained constant for water and 0.01% nanofluid. Optimal response from designxpert software is found to be 7.5pascal pressure-drop,2431.6Watts HTR at 50 degrees, 4lpm,0.01% nanoparticle concentration with 0.7 overall desirability.
Keywords
Corrugated Wavy Plate Heat Exchanger, Corrugated Angle, HTR, Optimum, Phi, MWCNT.
References
[1] Alessandra De Benedictis et al., “Digital Twins for
Anomaly Detection in the Industrial Internet of Things: Conceptual Architecture
and Proof-of-Concept,” IEEE Transactions on Industrial Informatics, vol. 19,
no. 12, pp. 11553-11563, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Zhi Qiang Wang,
and Abdulmotaleb El Saddik, “DTITD: An Intelligent Insider Threat Detection
Framework Based on Digital Twin and Self-Attention Based Deep Learning Models,”
IEEE Access, vol. 11, no. 10, pp. 114013-114030, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Seba Anna
Varghese et al., “Digital Twin-based Intrusion Detection for Industrial Control
Systems,” 2022 IEEE International Conference on Pervasive Computing and
Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa,
Italy, pp. 611-617, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Qinghua Xu,
Shaukat Ali, and Tao Yue, “Digital Twin-based Anomaly Detection with Curriculum
Learning in Cyber-Physical Systems,” ACM Transactions on Software Engineering
and Methodology, vol. 32, no. 5, pp. 1-32, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Burcu
Bolat-Akça, and Elif Bozkaya-Aras, “Digital Twin-Assisted Intelligent Anomaly
Detection System for Internet of Things,” Ad Hoc Networks, vol. 158, no. 10,
pp. 123-135, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Mikail Mohammed
Salim, David Camacho, and Jong Hyuk Park, “Digital Twin and Federated Learning
Enabled Cyberthreat Detection System for IoT Networks,” Future Generation
Computer Systems, vol. 161, pp. 701-713, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Fatemeh
Akbarian, Emma Fitzgerald, and Maria Kihl, “Intrusion Detection in Digital
Twins for Industrial Control Systems,” 2020 International Conference on
Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia,
pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] S. Krishnaveni
et al., “CyberDefender: An Integrated Intelligent Defense Framework for
Digital-Twin-Based Industrial Cyber-Physical Systems,” Cluster Comput, vol. 27,
no. 6, pp. 7273-7306, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[9] S. Krishnaveni
et al., “TwinSec-IDS: An Enhanced Intrusion Detection System in
SDN-Digital-Twin-Based Industrial Cyber-Physical Systems,” Concurrency and
Computation: Practice and Experience, vol. 37, no. 3, pp. 1-12, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Easa Alalwany
et al., “Stacking Ensemble Deep Learning for Real-Time Intrusion Detection in
IoMT Environments,” Sensors, vol. 25, no. 3, pp. 1-21, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Arreche,
Osvaldo, Tanish Guntur, and Mustafa Abdallah, “XAI-IDS: Toward Proposing an
Explainable Artificial Intelligence Framework for Enhancing Network Intrusion
Detection Systems,” Applied Sciences, vol. 14, no. 10, pp. 1-41, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] A. Namrita
Gummadi, J. C. Napier and M. Abdallah, “XAI-IoT: An Explainable AI Framework
for Enhancing Anomaly Detection in IoT Systems,” IEEE Access, vol. 12, no. 5,
pp. 71024-71054, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Nabeel H.
Al-A’araji, Safaa O. Al-Mamory, and Ali H. Al-Shakarchi, “Classification and
Clustering Based Ensemble Techniques for Intrusion Detection Systems: A
Survey,” Journal of Physics: Conference Series, Iraqi Academics Syndicate
International Conference for Pure and Applied Sciences (IICPS), Babylon, Iraq,
vol. 1818, pp. 1-35, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Ahmed Mahfouz
et al., “Ensemble Classifiers for Network Intrusion Detection Using a Novel
Network Attack Dataset,” Future Internet, vol. 12, no. 11, pp. 1-19, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Riccardo
Lazzarini, Huaglory Tianfield, and Vassilis Charissis, “A Stacking Ensemble of
Deep Learning Models for IoT Intrusion Detection,” Knowledge-Based Systems,
vol. 279, pp. 1-13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Yongzhong Cao
et al., “An Intrusion Detection System Based on Stacked Ensemble Learning for
IoT Network,” Computers and Electrical Engineering, vol. 110, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Ghalia
Nassreddine, Mohamad Nassereddine, and Obada Al-Khatib, “Ensemble Learning for
Network Intrusion Detection Based on Correlation and Embedded Feature Selection
Techniques,” Computer, vol. 14, no. 3, pp. 1-23, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Uday Chandra
Akuthota, and Lava Bhargava, “Transformer-Based Intrusion Detection for IoT
Networks,” IEEE Internet of Things Journal, vol. 12, no. 5, pp. 6062-6067, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Moussab Orabi
et al., “Anomaly Detection in Smart Manufacturing: An Adaptive Adversarial
Transformer-Based Model,” Journal of Manufacturing Systems, vol. 77, pp.
591-611, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Mustafa
Abdallah et al., “Anomaly Detection and Inter-Sensor Transfer Learning on Smart
Manufacturing Datasets,” Sensors, vol. 23, no. 1, pp. 1-22, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Baibhab
Chatterjee et al., “Context-Aware Collaborative Intelligence with
Spatio-Temporal In-Sensor-Analytics for Efficient Communication in a Large-Area
IoT Testbed,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6800-6814,
2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Yazeed
Alotaibi, and Mohammad Ilyas, “Ensemble-Learning Framework for Intrusion
Detection to Enhance Internet of Things’ Devices Security,” Sensors, vol. 23,
no. 12, pp. 1-20, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Tommaso Zoppi,
Andrea Ceccarelli, and Andrea Bondavalli, “MADneSs: A Multi-Layer Anomaly
Detection Framework for Complex Dynamic Systems,” IEEE Transactions on
Dependable and Secure Computing, vol. 18, no. 2, pp. 796-809, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Evgeniya
Petrova Nikolova, and Veselina Gospodinova Jecheva, “Anomaly Based Intrusion
Detection Based on the Junction Tree Algorithm,” Proceedings of the
International Multiconference on Computer Science and Information Technology,
pp. 641-649, 2007.
[Google Scholar] [Publisher Link]
[25] Danish Javeed
et al., “An Intrusion Detection System for Edge-Envisioned Smart Agriculture in
Extreme Environment,” IEEE Internet of Things Journal, vol. 11, no. 16, pp.
26866-26876, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Minyue Wu et
al., “TRACER: Attack-Aware Divide-and-Conquer Transformer for Intrusion
Detection in Industrial Internet of Things,” IEEE Transactions on Industrial
Informatics, vol. 21, no. 6, pp. 4924-4934, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Ahmad
Salehiyan, Pardis Sadatian Moghaddam, and Masoud Kaveh, “An Optimized
Transformer-GAN-AE for Intrusion Detection in Edge and IIoT Systems:
Experimental Insights from WUSTL-IIoT-2021, EdgeIIoTset, and TON_IoT Datasets,”
Future Internet, vol. 17, no. 7, pp. 1-34, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Haonan Peng,
Chunming Wu, and Yanfeng Xiao, “FD-IDS: Federated Learning with Knowledge
Distillation for Intrusion Detection in Non-IID IoT Environments,” Sensors,
vol. 25, no. 14, pp. 1-31, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Ali Abdi
Seyedkolaei, Fatemeh Mahmoudi, and José García, “A Deep Learning Approach for
Multiclass Attack Classification in IoT and IIoT Networks Using Convolutional
Neural Networks,” Future Internet, vol. 17, no. 6, pp. 1-21, 2025.
[CrossRef] [Google Scholar] [Publisher Link]