The aerodynamic characteristics of general three-dimensional rectangular wings are considered using non-linear interaction between two-dimensional viscous-inviscid panel method and vortex ring method. The potential flow of a two-dimensional airfoil by the pioneering Hess & Smith method was used with viscous laminar, transition and turbulent boundary layer to solve flow about complex configuration of airfoils including stalling effect. Viterna method was used to extend the aerodynamic characteristics of the specified airfoil to high angles of attacks. A modified vortex ring method was used to find the circulation values along span wise direction of the wing and then interacted with sectional circulation obtained by Kutta-Joukowsky theorem of the airfoil. The method is simple and based mainly on iterative procedure to find the wings post stall aerodynamic results. Parametric investigation was considered to give the best performance and results for the rectangular wings. Wing of NACA 0012 cross sectional airfoil was studied and compared with published experimental data for different speeds and angle of attacks. Pressure, skin friction, lift, drag, and pitching moment coefficients are presented and compared good with experimental data. The present method shows simple, quick and accurate results for rectangular wings of different cross-section airfoils.
This study delves into the design optimization of a hydropower harvesting system, exploring various parameters and their influence on system performance. By modifying the variables within the model to suit different flow conditions, a judiciously optimized design is attainable. Notably, the lift force generated is found to be intricately linked to the strategic interplay of the bluff body's location, cylinder dimensions, and flow velocity. The findings culminate in the establishment of empirical equations, one for lift force and another for displacement, based on the force equation. Many energy harvesting approaches hinge on the reciprocating motion inherent to the structural system. The methodology developed in this study emerges as a pot
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreElectrochemical method was used to prepare carbon quantum dots (CQDs). Size of matter was nature when evaluate via X-ray diffraction (XRD). A distinct peak at 2θ equal to 31.6° and three other small peaks at 38.28°, 56.41° and 66.12° were observed. The measures of Fourier Transform Infrared Spectroscopy (FTIR) showed the bonds in the transmittance spectrum are manufactured with carbon nanostructures in view. The first peaks are the O–H stretching vibration bands at (3417 and 2922) cm−1, (C–O–H at 1400, and 1317) cm−1, (C–H), (C=C), (C–O–H), (C=O), and (C–O) bonds at 2850, 1668, 1101, and 1026 cm−1 sequentially. The transmission electron microscopy (TEM) results presented that the spherical CQDs are in shape and on a
... Show MorePowder of silver nanoparticles was prepared by Sol - Gel method successfully using silver nitrate , (AgNO3) gesture is added to sodium citrate (C6H5O7Na3) as a reducing agent and by using Magnetic Stirrer to mix the solutions and heated then using centrifuge machine to separate the silver nanoparticles from solution .It is then dried in an oven at a temperature 40oC for 24 hours. Structure characteristics was studied , the synthetic silver powder was prepared through the use of an (XRD). Results showed the composition of silver nanoparticles is a (fcc) and a constant lattice (4.086 ± 0.006 Å) by comparing it with standard tables (JCPDS) which is found perfectly matched to file with a number 04-0783, which
... Show MoreThe linear segment with parabolic blend (LSPB) trajectory deviates from the specified waypoints. It is restricted to that the acceleration must be sufficiently high. In this work, it is proposed to engage modified LSPB trajectory with particle swarm optimization (PSO) so as to create through points on the trajectory. The assumption of normal LSPB method that parabolic part is centered in time around waypoints is replaced by proposed coefficients for calculating the time duration of the linear part. These coefficients are functions of velocities between through points. The velocities are obtained by PSO so as to force the LSPB trajectory passing exactly through the specified path points. Also, relations for velocity correction and exact v
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show More