In this paper, a least squares group finite element method for solving coupled Burgers' problem in 2-D is presented. A fully discrete formulation of least squares finite element method is analyzed, the backward-Euler scheme for the time variable is considered, the discretization with respect to space variable is applied as biquadratic quadrangular elements with nine nodes for each element. The continuity, ellipticity, stability condition and error estimate of least squares group finite element method are proved. The theoretical results show that the error estimate of this method is . The numerical results are compared with the exact solution and other available literature when the convection-dominated case to illustrate the efficiency of the proposed method that are solved through implementation in MATLAB R2018a.
Electro-chemical Machining is significant process to remove metal with using anodic dissolution. Electro-chemical machining use to removed metal workpiece from (7025) aluminum alloy using Potassium chloride (KCl) solution .The tool used was made from copper. In this present the optimize processes input parameter use are( current, gap and electrolyte concentration) and surface roughness (Ra) as output .The experiments on electro-chemical machining with use current (30, 50, 70)A, gap (1.00, 1.25, 1.50) mm and electrolyte concentration (100, 200, 300) (g/L). The method (ANOVA) was used to limited the large influence factors affected on surface roughness and found the current was the large influence f
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreGurney flap (GF) is well-known as one of the most attractive plain flaps because of the simple configuration and effectiveness in improving the lift of the airfoil. Many studies were conducted, but the effects of GF on the various airfoil types need to be further investigated. This study aimed to clarify the effect of GF in the case of the supercritical airfoil RAE2822. This research includes a steady, two-dimensional computational investigation carried out on the supercritical airfoil type RAE-2822 to analyze Gurney flap (GF) effects on the aerodynamic characteristics of this type of airfoil utilizing the Spalart-Allmaras turbulence model within the commercial software Fluent. The airfoil with the Gurney flap was analyz
... Show MoreThis paper demonstrates an experimental and numerical study aimed to compare the influence of openings of different configurations on the flexural behavior of prestressed concrete rafters. The experimental program consisted of testing six simply supported prestressed concrete rafters; 5 rafters are perforated, and the other one is solid as a reference. All rafters were tested under monotonic midpoint load. The variable which has been investigated in this work was the opening’s configuration (quadrilateral or circular) with the same upper and lower chords depths. The results indicate improvement in the beam flexural behavior using the circular openings compared to the quadrilateral o