The aerodynamic characteristics of the forward swept wing aircraft have been studied theoretically and experimentally. Low order panel method with the Dirichlet boundary condition have been used to solve the case of the steady, inviscid and compressible flow. Experimentally, a model was manufactured from wood to carry out the tests. The primary objective of the experimental work was the measurements of the wake dimensions and orientation, velocity defect along the wake and the wake thickness. A blower type low speed (open jet) wind tunnel was used in the experimental work. The mean velocity at the test section was (9.3 m/s) and the Reynolds number based on the mean aerodynamic chord and the mean velocity was (0.46x105). The measurements showed the existence of a three-dimensionality behavior in the wake flow field. Interference between the canard wake and the wing wake was observed. The canard effect on the wing root area was detected as the separation at the wing root was delayed due to the canard downwash. The aerodynamic coefficients for the forward swept wing aircraft were calculated using the measured wake shape from the experimental work. Numerical results showed that the canard extended the range of the angle of attack for the aircraft with a significant improvement for the lift curve slope compared to the aircraft without the canard.
A literary-educational work is a work that explains wisdom to the reader and presents moral, educational and instructional issues in a literary form. Qaboos-nameh or Nasihat al-Muluk is an educational and educational book that has a special place in the field of ethics and guidance, where the author guides his children. Also, Ibn al-Wardi's Lamiyah or Nasihat al-Akhwan is a poem containing moral advice and advice in 77 verses that Ibn al-Wardi wrote to his son.
It seems that the main goal of Ibn al-Wardi and Onsur AL-maali in Lamia and Qaboos-nameh was to express educational and moral issues and spread and convey them to future generations. Ibn al-Wardi, like Onsur AL-maali, listed moral points such as knowledge, humility
... Show MoreTwo local fish Himri Carasobarbus luteus (Heckel, 1843) and Hishni Liza abu (Heckel, 1843) were stained with Alizarin Red and featured some anatomical qualities which cleared the difference of the muscular and skeletal fabric for each fish. Since clear Histologic differences appeared in these two species, it was intended from this study the possibility of adopting a diagnosis between local fish species by staining bones and tissues.
Stylistics is the analysis of the language of literary texts integrated within various approaches to create a framework of different devices that describe and distinct a particular work. Therefore, feminist stylistics relied on theories of feminist criticism tries to present a counter- image of a woman both in language use and society, to draw attention , raise awareness and change ways that gender represents. Feminist stylistic analysis is related not only to describe sexism in a text, but also to analyze the way that point of view, agency, metaphor, and transitivity choices are unanticipatedly and carefully connected to issues of gender(Mills,1995:1) &nb
... Show MoreIn this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.
Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreConstruction of photographed bullying scale of kindergarteners was the aim of this study. The study conducted to answer the raised question, could the bullying among kindergarteners be measured?. A total of (200) boy and girl were selected from city of Baghdad to be the sample of the study. The scale composed of (27) item with colored pictures. It takes about (15) minuets to answer the whole scale items. SPSS tools were used to process the collected data. The result showed that the bullying among kindergarteners could be measured.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More