The study of entry and reentry dynamics for space vehicles is very important, particularly for manned vehicles and vehicles which is carry important devices and which can be used again. There are three types for entry dynamic, ballistics entry, glide entry and skip entry. The skip entry is used in this work for describing entry dynamics and determining trajectory. The inertia coordinate system is used to derive equations of motion and determines initial condition for skip entry. The velocity and drag force for entry vehicle, where generate it during entry into earth’s atmosphere are calculated in this work. Also the deceleration during descending and determining entry angles, velocities ratio and altitude ratio have been studied. The circular velocity and super circular velocity are used in this work as initial values. From results we noted the skip entry type has longer flight time compared with other types, and the velocity vehicle is lower at high layer for earth atmosphere, where the density of air is very low. Therefore the skip entry is suitable for space shuttle during entry from space
In this paper, the Monte-Carlo simulation method was used to compare the robust circular S estimator with the circular Least squares method in the case of no outlier data and in the case of the presence of an outlier in the data through two trends, the first is contaminant with high inflection points that represents contaminant in the circular independent variable, and the second the contaminant in the vertical variable that represents the circular dependent variable using three comparison criteria, the median standard error (Median SE), the median of the mean squares of error (Median MSE), and the median of the mean cosines of the circular residuals (Median A(k)). It was concluded that the method of least squares is better than the
... Show MoreIn this work, the circular patch antenna was fabricated and analyzed. Microwave Studio (version 2019) computer simulation technology (CST) was used to design the circular patch antenna. The material FR-4 was used to build this antenna, using the computer numerical control (CNC) method to implement this work. For the purpose of accomplishing this design, the values of the resonant frequency, dielectric constant and dielectric thickness of the material used as in 4.424, 2.4 GHz and 0.159 cm respectively were used as inputs to the CST program to get the said program outputs for the required antenna radius with the logarithmic function (F) of the circular patch antenna 1.6909 cm and 1.7415 cm respectively. Practically, the b
... Show MoreAn Experimental comparison between the current-voltage
characteristic and the efficiency conversion from solar to electric energy were studied for square and circular single crystal silicon solar
cell of equal area (35.28 cm2) . The results show that the solar shape is
an important factor in calculating the current-voltage characteristics and efficiency of the solar cell. It was shown that the performance effici
... Show MoreCircular data (circular sightings) are periodic data and are measured on the unit's circle by radian or grades. They are fundamentally different from those linear data compatible with the mathematical representation of the usual linear regression model due to their cyclical nature. Circular data originate in a wide variety of fields of scientific, medical, economic and social life. One of the most important statistical methods that represents this data, and there are several methods of estimating angular regression, including teachers and non-educationalists, so the letter included the use of three models of angular regression, two of which are teaching models and one of which is a model of educators. ) (DM) (MLE) and circular shrinkage mod
... Show MoreIn this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.
The continuous increase in population has led to the development of underground structures like tunnels to be of great importance due to several reasons. One of these reasons is that tunnels do not affect the living activities on the surface, nor they interfere with the existing traffic network. More importantly, they have a less environmental impact than conventional highways and railways. This paper focuses on using numerical analysis of circular tunnels in terms of their behavior during construction and the deformations that may occur due to overburden and seismic loads imposed on them. In this study, the input data are taken from an existing Cairo metro case study; results were found for the lateral and vertical displacements, the Peak
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreThe issue of the Circular Economy is not a new issue to several countries, especially the developed ones. Here in Iraq it is considered newly introduced, despite the few attempts to establish projects that concern recycling most of them were doomed to fail, due to two main reasons: the first one is the financial and administrative corruption widespread in all departments of the country, the second one is the priorities of public spending. It is well known that Iraq was subjected to two major attacks, the ISIS entry attack in 2014 to Iraq. ISIS occupied about a third of Iraqi lands which resulted in a collapse in oil prices, as Iraq depends almost entirely on oil revenues in its budget which is the second attack. This made the Iraqi governme
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More