In the current research, the work concentrated on studying the effect of curvature of solar parabolic trough solar collector on wind loading coefficients and dynamic response of solar collector. The response of collector to the aerodynamic loading was estimated numerically and experimentally. The curvature of most public parabolic trough solar collectors was investigated and compared. The dynamic response of solar collector due to wind loading was investigated by using numerical solution of fluid-structure interaction concept. The experimental work was done to verify the numerical results and shows good agreement with numerical results. The numerical results were obtained by using finite element software package (ANSYS 14). It was found that the change in collector curvature (focal length) lead to remarkable changes in wind loading coefficients (drag, lift, and moment), dynamic response (displacement) and natural frequencies but does not affect the first mode shape.
This research deals with one scene from the movie Romeo and Juliet, which is the balcony scene, due to the importance of this scene in the formation of the construction of the subsequent events of the movie.
The first chapter contained the methodological framework of the research, where the research problem was identified in how Zeffirelli dealt with the balcony scene in the play Romeo and Juliet and enriched it in the cinematic language with a comparison with the original text of the scene. In the balcony scene with comparative parts between the film and the text and the limits of the research that was limited to the film Zeffirelli and the translated text by Munis Taha Hussein.
The second chapter contained the theoretic
... Show MoreThe current research is a spectroscopic study of Coumarin 334 dissolved in methanol. The range of concentrations of the prepared stock solution was (3.39x10-9 to 2.03x10-8) M. Some optical characteristics of this dye were investigated such as absorbance and transmission spectra, absorption coefficient, refractive and extinction coefficients, oscillation and dispersion energies, and energy band gap. The absorbance spectra were recorded at 452 nm using Broad Band Cavity Enhanced Absorption Spectroscopy (BBCEAS) which depends on increasing the path length of the traveling light from the source to the detector. The minimum absorbance amount was 0.07 with a low concentration of 3.39x10-9 M. As a result, the ot
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreIn this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More