The present work aims to study the combustion characteristics related to syngas-diesel dual-fuel engine operates at lambda value of 1.6 operated by five different replacement ratios (RR) of syngas with diesel, which are (10%, 20%, 30 %, 40 % and 50%). ANSYS Workbench (CFD) was used for simulating the combustion of the syngas-diesel dual-fuel engine. The numerical simulations were carried out on the Ricardo-Hydra diesel engine. The simulation results revealed that the diesel engine’s combustion efficiency was enhanced by increasing the diesel replacement with Syngas fuel. The diesel engine’s combustion efficiency The peak in-cylinder temperature was enhanced from 915.9K to 2790.5K (50% RR). Moreover, the peak pressure was improved from 3659073 Pa to 4525366 pa (23% increase), 4947790 pa (35% increase), 5929709Pa (62% increase) and 6708188 Pa (83%) for diesel fuel mode and dual fuel mode (20%, 30%, 40% and 50%) respectively. Moreover, CO, NO, and CO2 emissions in the engine increased with the increase in syngas’ replacement ratio with diesel. Besides, the emission levels of NO, CO2 and CO from a diesel engine are lower than a dual fuel engine (syngas-diesel). The NO mass fraction values rise from 2.02505E-19 at diesel mode to 0.000834126 (20% RR), 0.004176854 (30% RR), 0.005021933 (40% RR) and 0.007554865 (50% RR). Moreover, the CO2 mass fraction values increase from 5.90944E-07 at diesel mode to 0.033849446 (50% RR).
An Auto Crop method is used for detection and extraction signature, logo and stamp from the document image. This method improves the performance of security system based on signature, logo and stamp images as well as it is extracted images from the original document image and keeping the content information of cropped images. An Auto Crop method reduces the time cost associated with document contents recognition. This method consists of preprocessing, feature extraction and classification. The HSL color space is used to extract color features from cropped image. The k-Nearest Neighbors (KNN) classifier is used for classification.
The primary aim of this paper is to present two various standpoints to define generalized membership relations, and state the implication between them, in order to categorize the digraphs and assist for their gauge exactness and roughness. In addition, we define several kinds of fuzzy digraphs.
Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,
... Show MoreIn the present work, an image compression method have been modified by combining The Absolute Moment Block Truncation Coding algorithm (AMBTC) with a VQ-based image coding. At the beginning, the AMBTC algorithm based on Weber's law condition have been used to distinguish low and high detail blocks in the original image. The coder will transmit only mean of low detailed block (i.e. uniform blocks like background) on the channel instate of transmit the two reconstruction mean values and bit map for this block. While the high detail block is coded by the proposed fast encoding algorithm for vector quantized method based on the Triangular Inequality Theorem (TIE), then the coder will transmit the two reconstruction mean values (i.e. H&L)
... Show MoreThere are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.
Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe
... Show MoreThe secure data transmission over internet is achieved using Steganography. It is the art and science of concealing information in unremarkable cover media so as not to arouse an observer’s suspicion. In this paper the color cover image is divided into equally four parts, for each part select one channel from each part( Red, or Green, or Blue), choosing one of these channel depending on the high color ratio in that part. The chosen part is decomposing into four parts {LL, HL, LH, HH} by using discrete wavelet transform. The hiding image is divided into four part n*n then apply DCT on each part. Finally the four DCT coefficient parts embedding in four high frequency sub-bands {HH} in
... Show MoreIn this study the activities of alanine transaminase (ALT) and aspartate transaminase (AST) were evaluated, in addition to total protein and albumins in sera of sixty one subjects whose ages were ranged between(4-16) years. These subjects were, twenty eight major thalassemic patient (12 with splenectomy and 16 non splenectomy ) and fifteen with minor thalassemia. eighteen healty subjecte as control. The result revealed a significant elevation in the activities of both aminotransferases enzymes (AST and ALT) in the sera of all the alassmic patient groups compared with control. Also a significant increase in the activity of ALT in sera of non-splenectomy compared to splenectomy major thalassemic patient , which could be an indicative of th
... Show More