Forward-swept wings were researched and introduced to improve maneuverability, control, and fuel efficiency while reducing drag and they are often used alongside canards, to further enhance their characteristics. In this research, the effects of canard dihedral angles on the wing loading of a forward-swept wing in transonic flow conditions were studied, as the wing loading provides a measure of wing’s efficiency (lift/drag). A generic aircraft model from literatures was selected, simulated, and compared to, using CFD software ANSYS/Fluent where the flow equations were solved to calculate the aerodynamic characteristics. The research was carried at two different Mach numbers, 0.6 and 0.9, for five different canard dihedral angles which traverses from below the wing plane to above it, at various flow angles of attack. It was concluded that as the dihedral angle increased, lift increases for the same angle of attack for Mach 0.6 and 0.9 which increases the efficiency of the wing. The wing span loading occur at 10° dihedral angle for both Mach speeds, while, at 10° anhedral, the lift was minimal due to leading-edge flow separation on the FSW's lower surface. Thus, it is concluded that the canard at positive dihedral angles ensures increased wing span loading efficiency.
Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe exploitation of obsolete recyclable resources including paper waste has the advantages of saving resources and environment protection. This study has been conducted to study utilizing paper waste to adsorb phenol which is one of the harmful organic compound byproducts deposited in the environment. The influence of different agitation methods, pH of the solution (3-11), initial phenol concentration (30-120ppm), adsorbent dose (0.5-2.5 g) and contact time (30-150 min) were studied. The highest phenol removal efficiency obtained was 86% with an adsorption capacity of 5.1 mg /g at optimization conditions (pH of 9, initial phenol concentration of 30 mg/L, an adsorbent dose of 2 g and contact time of 120min and at room temperature).
... Show MoreThe present study was conducted to evaluate the effect of fungi Gigaspora margarita and Glomus desriticola in stimulating the resistance of the capsicum annuum L. towards the chromium and lead after 60 days, planting and using the pots in the glass house. The highest concentration of chromium and lead in the root was found in the presence of the mycorrhizal mixture (194.93, 150.40) μg / g, respectively, compared to the lowest concentration (90.69, 79.37) μg / g respectively, while the highest concentration of chromium and lead in the shoot was found in the presence of the mycorrhizal mixture (94.63, 79.33) μg / g respectively, compared with the lowest concentration in the control treatment (72.58, 60.70) μg / g respectively. The results
... Show MoreThe objective of present study was to compare of several methods for estimating the degree of heritability and calculating the number of genes using generation mean analysis of maize (
Amino and fatty acids in the liver tissue of Uromastyx aegyptius microlepis during the periods of hibernation (December) and activity (May) were estimate by a high performance liquid chromatography, liver of a lizard during the activity and hibernation seasons, contained 18 amino acids, which include, 10 essential amino acids and 8 non-essential amino acids, and the liver in the male lizard contained five fatty acids during each season, the concentration rates of all the amino acids during the activity season were higher than their counterparts during the hibernation season, the total concentrations of essential and non-essential amino acids during the activity season were 19434.8 µg/ml, which was greater than the total concentrations leve
... Show MoreThis study aims to identify the amount of the effect of the ability to learn the individuals within the organization on the accumulation of intellectual capital and the role it plays in improving the performance of the organization, and to achieve that, the researcher designed a questionnaire to collect data and information from the surveyed respondents and analyzed using SPSS software, the study concluded after testing hypotheses to have a direct impact between the capacity for organizational learning and the accumulation of intellectual capital, which in turn affects the accumulation of intellectual capital as a positive and direct impact on the performance of the organization, al
... Show More