In this study, the thermal buckling behavior of composite laminate plates cross-ply and angle-ply all edged simply supported subjected to a uniform temperature field is investigated, using a simple trigonometric shear deformation theory. Four unknown variables are involved in the theory, and satisfied the zero traction boundary condition on the surface without using shear correction factors, Hamilton's principle is used to derive equations of motion depending on a Simple Four Variable Plate Theory for cross-ply and angle-ply, and then solved through Navier's double trigonometric sequence, to obtain critical buckling temperature for laminated composite plates. Effect of changing some design parameters such as, orthotropy ratio (E1/E2), aspect ratio (a/b), thickness ratio (a/h), thermal expansion coefficient ratio (α2/α1), are investigated, which have the same behavior and good agreement when compared with previously published results with maximum discrepancy (0.5%).
Twisted tape insertion in the smooth plain tube is one of the types of passive methods that are used to enhance heat transfer. Swirl fluid flow inside the tube and related heat transfer characteristics are very complex. ANSYS FLUENT (V 16.1) and ASPEN industrial program are used in analyzing this technique for enhancement heat transfer. A circular plain tube has length L=8534mm and 17 mm inner diameter with a twisted tape of twist ratio of y = (H/D) = (150/17) =8.8 along the plain tube were considered for this study. Eight Reynolds numbers (Re) of 784, 1000, 2000, 3000, 4000, 5000, 6000 and 7000 are used to analyze the response of thermal performance. Crude oil API 28 exit temperature, film heat transfer coefficient, Nus
... Show MoreIn this research work a composite material was prepared contains a matrix which is unsaturated polyester resin (UPE) reinforced with carbon nanotube the percentage weight (0.1, 0.2, 0.4.0.5) %, and Zn particle the percentage weight (0.1, 0.2,0.4,0.5)%.
All sample were prepared by hand lay-up, process the mechanical tests contains hardness test, wear rate test, and the coefficient of thermal conductivity. The results showed a significant improvement in the properties of overlapping, Article containing carbon nano-tubes and maicroparticles of zinc because of its articles of this characteristics of high quality properties led to an, an increase in the coefficient of the rmalconductivity, and increase the hardness values with increased pe
The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Deci
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreIn recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More