The main objective of the present work is to find a method increases the efficiency of the airfoil that is used for blade in wind turbine, wing in aircraft, propeller and helicopter (like NACA 4412). By overcoming the separation of flow at high angle of attacks, a slotted airfoil had been used and solved numerically through connecting the pressure side in the bottom surface with the suction side in the top surface of the airfoil to energize the separated flow. Slot exit, width and slope were considered as a parameters of slot configuration to determine the effective design of consideration. Reynolds number was taken as [1.6 x106 ] and the angle of attacks were ranged from (0o - 20o ). The numerical solution with Ansys Fluent commercial program had been used to solve a fully turbulent N.S. equations with κ-ω SST turbulence model. The method of changing variables with best one among them was adopted to find the design of the slot. The results of flow field and airfoil characteristics for solid and slotted airfoil were described and illustrated in the present work which showed that the airfoil produces higher lift coefficient value and lower drag coefficient as compared with solid airfoil. Moreover, it delays stalling angle of attack to 19o . The slotted airfoil shows an increasing in maximum lift to drag ratio up to 110% at angle of attack 18o . The most effective slot is found at 60% chord, slope 65o and width 1% chord.
Recently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show MoreInclination Of The Lumbosacral Angle In Normal Individuals: An Mri Study,GJRA - Global Journal For Research Analysis(GJRA) GJRA is a double reviewed monthly print journal that accepts research works. 36572+ Manuscript submission, 9855+ Research Paper Published, 100+ Articles from over 100 Countries
ABSTRACT
Critical buckling temperature of angle-ply laminated plate is developed using a higher-order displacement field. This displacement field used by Mantari et al based on a constant ‘‘m’’, which is determined to give results closest to the three dimensions elasticity (3-D) theory. Equations of motion based on higher-order theory angle ply plates are derived through Hamilton, s principle, and solved using Navier-type solution to obtain critical buckling temperature for simply supported laminated plates. Changing (α2/ α1) ratios, number of layers, aspect ratios, E1/E2 ratios for thick and thin plates and their effect on thermal
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreVariable selection in Poisson regression with high dimensional data has been widely used in recent years. we proposed in this paper using a penalty function that depends on a function named a penalty. An Atan estimator was compared with Lasso and adaptive lasso. A simulation and application show that an Atan estimator has the advantage in the estimation of coefficient and variables selection.
Background: Echocardiography has an important role to follow up patients with Iatrogenic atrial septaldefect (IASD) and after Catheter ablation during electro-physiological study.Objectives: evaluating the impact of non-invasive Transthoracic Echocardiography (TTE) parameters(LAVI, LVEF, ASD size and E/e`) post radiofrequency ablation of left atrial arrhythmia.Patients and methods: for the evaluation of the atrial septal defect, a transthoracic echocardiography(TTE) was used in patients who underwent left atrial arrhythmia ablation, enrolled in prospective studyin the Iraqi center for cardiac diseases, in cooperation with university of Baghdad /college of medicineResults: The outcomes of the present study were assessed according to
... Show MorePV connected systems are worldwide installed because it allows consumer to reduce energy consumption from the electricity grid. This paper presents the results obtained from monitoring a 1.1 kWp. The system was monitored for nine months and all the electricity generated was fed to the fifth floor for physics and renewable energy building 220 V, 50 Hz. Monthly, and daily performance parameters of the PV system are evaluated which include: average generated of system Ah per day, average system efficiency, solar irradiation around these months. The average generated kWh per day was 8 kWh/day, the average solar irradiation per day was 5.6 kWh/m2/day, the average inverter efficiency was 95%, the average modules efficien
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More