An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on the baseline car for different Reynolds numbers was (0.381) and the drag force was reduced by adding a spoiler and a slice diffuser to (4.45%, 1.5%) respectively, whereas the amount of drag reduction was (5.46%) when all drag reduction modifications were added together on the base car. No effect was noticed as vortex generators when added separately. The deviation in the drag coefficient from the real car testing was about (6.2%) and shows a very good agreements between the real car test and that of the wind tunnel test.
Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreIn this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe aim of this research is to estimate the parameters of the linear regression model with errors following ARFIMA model by using wavelet method depending on maximum likelihood and approaching general least square as well as ordinary least square. We use the estimators in practical application on real data, which were the monthly data of Inflation and Dollar exchange rate obtained from the (CSO) Central Statistical organization for the period from 1/2005 to 12/2015. The results proved that (WML) was the most reliable and efficient from the other estimators, also the results provide that the changing of fractional difference parameter (d) doesn’t effect on the results.
Abstract:
The phenomenon of financial failure is one of the phenomena that requires special attention and in-depth study due to its significant impact on various parties, whether they are internal or external and those who benefit from financial performance reports. With the increase in cases of bankruptcy and default facing companies and banks, interest has increased in understanding the reasons that led to this financial failure. This growing interest should be a reason to develop models and analytical methods that help in the early detection of this increasing phenomenon in recent year . The research examines the use of
... Show MoreThe nucleon momentum distributions (NMD) and elastic electron scattering form factors of the ground state for some 1f-2p-shell nuclei, such as 58Ni, 60Ni, 62Ni, and 64Ni
isotopes have been calculated in the framework of the coherent fluctuation model (CFM) and expressed in terms of the weight function lf(x)l2 . The weight function (fluctuation function) has been related to the nucleon density distribution (NDD) of the nuclei and determined from the theory and experiment. The NDD is derived from a simple method based on the use of the single particle wave functions of the harmonic oscillator potential and the occupation numbers of the states. The feature of the l
This paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groy
... Show MorePurpose - This study relies on the descriptive and analytical approach through collecting and analyzing the necessary data, as this approach focuses on polling the opinions of the research sample and its directions, and aims to develop a model that studies the relationship between knowledge creation and organizational ambidexterity in Iraqi private banks and verifying its validity experimentally. Design / Methodology / Introduction - A survey was conducted through a questionnaire form to collect data from a sample of (113) managers in private commercial banks. In addition, this study used the AMOS program and the ready-to-use statistical program package (SPSS V.25) to test the proposed hypotheses of the theoretical model experimentally. Res
... Show MoreIn this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.