The designer must find the optimum match between the object's technical and economic needs and the performance and production requirements of the various material options when choosing material for an engineering application. This study proposes an integrated (hybrid) strategy for selecting the optimal material for an engineering design depending on design requirements. The primary objective is to determine the best candidate material for the drone wings based on Ashby's performance indices and then rank the result using a grey relational technique with the entropy weight method. Aluminum alloys, titanium alloys, composites, and wood have been suggested as suitable materials for manufacturing drone wings. The requirements for designing a drone's wings are to make them as light as possible while meeting the stiffness, strength, and fracture toughness criteria. The conclusion indicates that Carbon Fiber-Reinforced Polymer (CFRP) is the best material for producing drone wings. In contrast, wood and aluminum alloys were the cheapest materials when the design had to be inexpensive.
The possibility of using activated carbon developed from date palm seeds wastes as a permeable reactive barrier (PRB) to remove copper from polluted shallow groundwater was investigated. The activated carbon has been developed from date palm seeds by dehydrating methods using concentrated sulfuric acid. Batch tests were performed to characterize the equilibrium sorption properties of new activated carbon in copper-containing aqueous solutions, while the sandy soil (aquifer) was assumed to be inert. Under the studied conditions, the Langmuir isotherm model gives a better fit for the sorption data of copper by activated carbon than other models. At a pilot scale, One-dimensional column experiments were performed, and an integrated model ba
... Show MoreThe aim of the research is to identify the extent of the ability to ensure the integrated reports by the auditor in verifying the credibility of these reports, and their implications for the benefit of all parties dealing with the economic unit, as well as measuring the impact of the assurance procedures followed by the auditors and their role in confirming these reports.
The research methodology was designed after studying the previous literature related to the research variables, and then the relationship between these variables was tested, through the use of a questionnaire list. A questionnaire targeting the community of auditors in the local environment, and the results of the study wer
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreThe drought is a globally phenomenon, its influence will convert large parts of Middle East and North Africa (MENA) region into hot dry deserts under the expectations of the climate change scenarios. Climate limitations, soil erosion affected by weather properties such as unequally and limited rainfall; temperature changing and wind, unsuitable irrigation techniques, excessive grazing, agricultural expansion against to the natural habitats, extensively clearance of natural vegetation, and soil salinity had all contributed to land degradation, reduced water supplies, and limited agricultural production in Iraq. It is estimated that nearly 54.3 % of Iraq's area is threatened by desertification problems.
In this research, for Iraq the Cl
Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o
... Show MoreThe fractional order partial differential equations (FPDEs) are generalizations of classical partial differential equations (PDEs). In this paper we examine the stability of the explicit and implicit finite difference methods to solve the initial-boundary value problem of the hyperbolic for one-sided and two sided fractional order partial differential equations (FPDEs). The stability (and convergence) result of this problem is discussed by using the Fourier series method (Von Neumanns Method).
In this paper, a new method of selection variables is presented to select some essential variables from large datasets. The new model is a modified version of the Elastic Net model. The modified Elastic Net variable selection model has been summarized in an algorithm. It is applied for Leukemia dataset that has 3051 variables (genes) and 72 samples. In reality, working with this kind of dataset is not accessible due to its large size. The modified model is compared to some standard variable selection methods. Perfect classification is achieved by applying the modified Elastic Net model because it has the best performance. All the calculations that have been done for this paper are in