An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on the baseline car for different Reynolds numbers was (0.381) and the drag force was reduced by adding a spoiler and a slice diffuser to (4.45%, 1.5%) respectively, whereas the amount of drag reduction was (5.46%) when all drag reduction modifications were added together on the base car. No effect was noticed as vortex generators when added separately. The deviation in the drag coefficient from the real car testing was about (6.2%) and shows a very good agreements between the real car test and that of the wind tunnel test.
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreIn this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Biometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in
... Show MoreThe present study investigated Haematological changes in Mesopotamichthys sharpeyi, as well as determination genotoxic effects of cadmium chloride on bunni fish by using 120 fingerlings, fish were distributed randomly into four treatments in addition to control group. Fish in first group treated (T1) with cadmium 0.093mg/L with changing water and added cadmium continuously, fish in the second group treated (T2) with cadmium 0.093mg/L with changing water without adding cadmium, third treatment (T3) with cadmium 0.046mg/L with changing water and adding cadmium continuously, and fourth treatment (T4) with cadmium 0.046mg/L with changing water without adding cadmium. Results of blood picture in T1 and T3 showed a significant reduction in red bl
... Show MoreIndia is today the largest democratic state in the Third World and has been able to maintain its national unity in the near future. The history of Indian civilization is more than 5,000 years old. It has achieved its heritage, culture, philosophy, traditions, national unity and unity and has taken its place among nations seeking progress and progress. Which are still visible to the present day, because of their history of civilization and achievements, and the fusion of cultures of invading peoples over the centuries with the culture of diverse Indian society, but despite being a secular state, Has put into place through its governments various forms of exclusion and marginalization towards the people of India, especially Muslims, and th
... Show More