In order to improve the effectiveness, increase the life cycle, and avoid the blade structural failure of wind turbines, the blades need to be perfectly designed. Knowing the flow angle and the geometric characteristics of the blade is necessary to calculate the values of the induction factors (axial and tangential), which are the basis of the Blade Element Momentum theory (BEM). The aforementioned equations form an implicit and nonlinear system. Consequently, a straightforward iterative solution process can be used to solve this problem. A theoretical study of the aerodynamic performance of a horizontal-axis wind turbine blade was introduced using the BEM. The main objective of the current work is to examine the wind turbine blade’s performance under specific initial and boundary conditions. In this study, NACA 4415 airfoils were selected to do this investigation. The turbine blades were divided into small segments to calculate the forces acting upon each segment to assess their impact on the final wind turbine blade design. An extensive and critical analysis of the chosen wind turbine was performed, including lift, drag, shear force, and bending moment calculations. Based on the computations, the values of total thrust force, torque, and power generation values for the optimal wind turbine were 3755.9 N, 1834 Nm, and 30.122 kW, respectively. Furthermore, a significant finding emerges from the analysis, indicating that the largest difference in power occurs at r/R=0.8, amounting to 5.5239 kW. The new Matlab code was validated. The key contribution of this study lies in enhancing turbine efficiency and reducing fatigue losses through optimizing wind turbine blade design to obtain the highest efficiency level. The outcomes demonstrate that the newly implemented MATLAB code exhibits exceptional accuracy in assessing aerodynamic performance, enabling efficient wind turbine blade design optimization.
Universities are among spaces where it's important to ensure thermal comfort in indoor spaces, improving the occupants' well-being and productivity. The problem of the research was to study appropriate glazing systems for the spaces of the University of Baghdad because glazing systems are one of the most important elements of the indoor environments, and it has a major impact on the thermal performance of buildings. Glass is one of the most seasoned materials that are most utilized in the design. Since it is a diaphanous material, it allows sunlight to enter the building, increasing the space's temperature, cooling loads, and energy consumption in summer. The research followed the experimental method by studying and
... Show Moreيهدف البحث الى أعداد بعض تمرينات الاساسية لسلاح الشيش بأستخدام المرايا في تطوير قدرة مستوى تعلم الطالبات في المبارزة ومعرفة الفروق بين المجموعتين التجريبي والضابطة بتأثير استخدام المرايا في مستوى اداء بعض مهارات سلاح الشيش لطالبات المرحلة الثالثة , وقد أستخدمت الباحثتان المنهج التجريبي على عينة من طالبات المرحلة الثالثة , وقد بلغ عددهم (45) طالبة , وقد خرجت الباحثتين بعدة أستنتاجات وهي:- - أن المنهاج التعليمي
... Show MoreThe aim of this research is to identify the extent to which the Conventional and Islamic banks are committed to implement the requirements of the corporate governance in its financial reports. In addition to its commitment to transparency and clarity in dealing with the shareholders and stockholders to protect their interests and to determine the impact of the commitment of the corporate governance on assessing the financial performance of the conventional and Islamic banks that participate in Bahrain Stock Exchange.
The research aims at shedding light on the impact of the organizational commitment on the performance of the Iraqi insurance company as a service company that provides many services to customers both internal (individuals working) or external, Whenever the company was able to adopt new concepts to increase the understanding and knowledge of how their attention to individuals working and to provide an appropriate working environment, and to clarify the objectives and strategies for them, and create a sense of their importance, as reflected on job performance in attracting new customers, and build long-term relationships with them . In order to achieve this, the research relied on the questionnaire as a main tool for collecting data and in
... Show MoreThe present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and col
... Show MoreThe function of internal auditing has become an important function that aims at achieving objectives that are compatible with these developments and changes that have occurred in many countries in the world, which required the emergence of professional associations and institutes in the profession of internal auditing. Improve the guideline of the internal audit units issued by the Federal Audit Bureau to enhance the efficiency of internal audit performance in Iraqi government units. The researchers adopted the statistical method of proving the hypothesis by constructing a questionnaire that included three main axes: supporting the senior management in adopting the current guide, and the second being the importance of improving t
... Show MoreThis paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT),(median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Laplace has recorded a better accuracy. Our experimental evaluation on re
... Show MoreThe aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The data was analyzed and statistical results rejected null hypothesis of this study. This study revealed that there are no signifigant differences between PBL and PBL with lecture method, thus the PBL without or with lecture method enhances the self-directed learning skills bette
... Show MoreIn this paper a modified approach have been used to find the approximate solution of ordinary delay differential equations with constant delay using the collocation method based on Bernstien polynomials.
Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show More