Unlike welding, soldering does not involve melting the work pieces. Soldering is a process in which two or more items are joined together by melting and putting a filler metal (solder) into the joint. Failure in the solder joint may make the system components lose their functions. Electrical wiring and electronic components are joined to devices and printed circuit boards using soldering. Soldering and brazing are both used in the assembly of musical instruments. Lead-tin alloy solder employed in the current investigation which has a diameter of 4 mm and a density of 11.0103 kg/m3 with continuous heat flux heating from the domain's left side and complete insulation on the other side. The melting of PCM was simulated using the ANSYS (Fluent) melting model. Three procedures were followed during the heating stage of the reflow process to perform the melting heat-transfer analysis. The simulation's results were recorded at regular intervals of 15 seconds. The results show melting rate increases as time proceeds. It is almost the same at the initial stages and increases in the middle and the end of the melting process. Heat transfer happens mostly through conduction during the first 0–30 seconds of the melting process, changing to natural convection as the material continues to heat up.
The densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of
... Show MoreA novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio
... Show MoreA nonlinear filter for smoothing color and gray images
corrupted by Gaussian noise is presented in this paper. The proposed
filter designed to reduce the noise in the R,G, and B bands of the
color images and preserving the edges. This filter applied in order to
prepare images for further processing such as edge detection and
image segmentation.
The results of computer simulations show that the proposed
filter gave satisfactory results when compared with the results of
conventional filters such as Gaussian low pass filter and median filter
by using Cross Correlation Coefficient (ccc) criteria.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreEach project management system aims to complete the project within its identified objectives: budget, time, and quality. It is achieving the project within the defined deadline that required careful scheduling, that be attained early. Due to the nature of unique repetitive construction projects, time contingency and project uncertainty are necessary for accurate scheduling. It should be integrated and flexible to accommodate the changes without adversely affecting the construction project’s total completion time. Repetitive planning and scheduling methods are more effective and essential. However, they need continuous development because of the evolution of execution methods, essent
Hard-grade asphalt binders like AC20-30 typically exhibit excessive stiffness, reduced penetration, and compromised workability, necessitating modification before use in paving applications. This study evaluates the efficacy of regular polyalphaolefin (PAO), a synthetic olefin-based lubricant, as a performance-enhancing modifying agent for such binders. AC20-30 was blended with PAO at dosages ranging from 2 wt.% to 10 wt.%, and the modified binders were characterized via penetration, ductility, softening point, and rotational viscosity measurements, alongside advanced rheological and chemical-morphological analyses. Incorporating PAO in AC20-30 asphalt progressively reduced the binder stiffness and enhanced its flexibility, with all modifie
... Show MoreIn the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show More