The aim of this article is to solve the Volterra-Fredholm integro-differential equations of fractional order numerically by using the shifted Jacobi polynomial collocation method. The Jacobi polynomial and collocation method properties are presented. This technique is used to convert the problem into the solution of linear algebraic equations. The fractional derivatives are considered in the Caputo sense. Numerical examples are given to show the accuracy and reliability of the proposed technique.
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreThis study was chosen because of the entry of our regions into the seismic zone recently, where Diyala governorate was hit by the Halabja earthquake in 2017 by 7.3Mw. Therefore, the impact of earthquakes will be studied on the AL-Mafraq bridge foundations piles located in Iraq- east of Baghdad in Diyala Governorate and the extent of its resistance to the Halabjah, EL-Centro, and Kobe earthquakes with acceleration 0.1g, 0.34g, and 0.58g respectively. After modeling and performing the analysis by using Midas Gts-Nx software, the settlement (mm) results at nine nodes (four nodes for the pile cap and five nodes for the piles) were obtained for each of Halabjah, EL-Centro, and Kobe earthquakes to know the resistance of the br
... Show MoreIn this work, a flat-plate solar air heater (FSAH) and a tubular solar air heater (TSAH) were designed and tested numerically. The work investigates the effect of increasing the contact area between the flowing air and the absorber surface of each heater and predicts the expected results before the fabrication of the experimental rig. Three-dimensional two models were designed and simulated by the ANSYS-FLUENT 16 Program. The solar irradiation and ambient air temperature were measured experimentally on December 1st 2022, at the weather conditions of Baghdad City- Iraq, at three air mass flow rates, 0.012 kg/s, 0.032 kg/s, and 0.052 kg/s. The numerical results showed the advantage in the thermal performance of
... Show MoreThe determination of aerodynamic coefficients by shell designers is a critical step in the development of any projectile design. Of particular interest is the determination of the aerodynamic coefficients at transonic speeds. It is in this speed regime that the critical aerodynamic behavior occurs and a rapid change in the aerodynamic coefficients is observed. Two-dimensional, transonic, flow field computations over projectiles have been made using Euler equations which were used for solution with no special treatment required. In this work a solution algorithm is based on finite difference MacCormack’s technique for solving mixed subsonic-supersonic flow problem. Details of the asymmetrically located shock waves on the projectiles hav
... Show MoreThis paper demonstrates an experimental and numerical study aimed to compare the influence of openings of different configurations on the flexural behavior of prestressed concrete rafters. The experimental program consisted of testing six simply supported prestressed concrete rafters; 5 rafters are perforated, and the other one is solid as a reference. All rafters were tested under monotonic midpoint load. The variable which has been investigated in this work was the opening’s configuration (quadrilateral or circular) with the same upper and lower chords depths. The results indicate improvement in the beam flexural behavior using the circular openings compared to the quadrilateral o
Gurney flap (GF) is well-known as one of the most attractive plain flaps because of the simple configuration and effectiveness in improving the lift of the airfoil. Many studies were conducted, but the effects of GF on the various airfoil types need to be further investigated. This study aimed to clarify the effect of GF in the case of the supercritical airfoil RAE2822. This research includes a steady, two-dimensional computational investigation carried out on the supercritical airfoil type RAE-2822 to analyze Gurney flap (GF) effects on the aerodynamic characteristics of this type of airfoil utilizing the Spalart-Allmaras turbulence model within the commercial software Fluent. The airfoil with the Gurney flap was analyz
... Show MoreThis paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More