A winglet is devices attached at the wing tips, used to improve aircraft wing efficiency by reduction influence wing tips vortices and induct drag, increasing lift force at the wing tips and effective aspect ratio without adding greatly to the structural stress and weight in the wing structure. This paper is presented three-dimensional numerical analysis to proposed modification swept back wing by adding Raked winglets devices at the main wing tips belong the two seat trainer aircraft type Aermacchi Siai S211 by using Fluent ANSYS 13 software. CFD numerical analysis process was performed at the same flight boundary conditions indifferent wing angle of attacks with constant air flow velocity V∞ =50 (m/sec), ambient pressure Po=101325 (Pa), ambient temperature To=288.14 (K), and at air density ρo=1.225 (kg\m3) to both proposed wing model and the main aircraft wing model. The results are shown an improvement in aerodynamic parameters including increment lift coefficient to (0.22%-5.95%), reduction drag coefficient to (0.34% - 3.60%), increment wing load efficiency ratio to (2.62% - 7.30%), reduction induct drag coefficient CDi to (7.65% - 13.11%) compared with the main aircraft wing model and achieved an improvement in aircraft flight maneuver abilities and stability controls especially during descent, approach, landing and takeoff with lower speed with shortage runway.
Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi
... Show MoreAim: This abstract aims to highlight the critical nature of climate change as a pressing challenge facing humanity in the 21st century. It underscores the severe consequences it poses to essential facets of human existence, including water and energy resources, agricultural production, and the broader environmental systems. Method: The abstract primarily utilizes a descriptive approach to emphasize the impact of climate change on the Middle East, particularly the Arab region. It relies on a review of existing knowledge and data related to climate change and its effects on ecosystems and drought patterns. Results: The abstract outlines the direct and indirect repercussions of climate change on human life and the environment. It draws atten
... Show MoreThe study was conducted to identify the toxicity of chromium on scenedesmus quadricauda algae alone and in the presence of nutrient metal (Nitrogen). Different concentrations of chromium (0.5, 1.5 , 2.5, 3.5 , 4.5mg/L) were used and the presence nitrogen is (5 ,10 ,50 ,100mg/L) on cultur media(chu-10) with used for cultivation of the algae in controlled conditions(25oC , light intensity 380 –?E/m2 /s. The results showed increasing in the toxicity of the metal when is alone , excess of concentrations an time of exposure. The growth rate decreased from 0.44 to 0.06 cell/ hour after 12 day of the biging of the experiment and of concentrate 4.5 mg/L of chromium. The intermediate active concentrations of the chromium(EC50) was increase
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreA load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The
... Show MoreMagneto-rheological (MR) valve is one of the devices generally used to control the speed of Hydraulic actuator of MR fluid. The performance of valve depends on the magnetic circuit design. Present study deals with a new design of MR valve. A mathematical model for the MR valve is developed and the simulation is carried out to evaluate the newly developed MR valve. The design of the magnetic circuit is accomplished by magnetic finite element software such as Finite Element Method Magnetic (FEMMR). The model dimensions of MR valve, material properties are taken into account. The results of analysis are presented in terms of magnetic strength H and magnetic flux density B. The simulation results based on the proposed model indicate that the ef
... Show More