The main objective of the present work is to find a method increases the efficiency of the airfoil that is used for blade in wind turbine, wing in aircraft, propeller and helicopter (like NACA 4412). By overcoming the separation of flow at high angle of attacks, a slotted airfoil had been used and solved numerically through connecting the pressure side in the bottom surface with the suction side in the top surface of the airfoil to energize the separated flow. Slot exit, width and slope were considered as a parameters of slot configuration to determine the effective design of consideration. Reynolds number was taken as [1.6 x106 ] and the angle of attacks were ranged from (0o - 20o ). The numerical solution with Ansys Fluent commercial program had been used to solve a fully turbulent N.S. equations with κ-ω SST turbulence model. The method of changing variables with best one among them was adopted to find the design of the slot. The results of flow field and airfoil characteristics for solid and slotted airfoil were described and illustrated in the present work which showed that the airfoil produces higher lift coefficient value and lower drag coefficient as compared with solid airfoil. Moreover, it delays stalling angle of attack to 19o . The slotted airfoil shows an increasing in maximum lift to drag ratio up to 110% at angle of attack 18o . The most effective slot is found at 60% chord, slope 65o and width 1% chord.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Every cultural achievement is a creative text, and every text is a group of signs. The Winged Bull sculpture is a sort of text that is not confined to some signs; indeed, its cultural signs go far beyond as they are open-ended, everlasting and it lends itself to various horizons of interpretation. The recipient has to combine the signs of this sculpture, which belong to different patterns, in the pursuit for perfection so that he can decode its media message.
I have tackled this sculpture by adopting a semiotic approach. The semiotic approach is a modern critical approach which is as wide as culture and as rich as knowledge. It has been linked to modernism, which in turn has been linked to modern critical approaches, because it can
Gastroesophageal reflux disease (GERD) is a prevalent clinical condition, that affects millions of individuals worldwide. Objective: To assess the level of soluble HLA-E (sHLA-E) as a biomarker in the diagnosis and immunopathogenesis of GERD patients. Methods: The case-control prospective study included 40 GERD patients who were consulted at the Gastroenterology Unit of AlKindy Teaching Hospital, as along with 40 healthy control subjects. The study period extended from January 2023 to May 2024. Blood was drawn from both groups and serum was separated to assesssHLA-E using a sandwich enzyme-linked immunosorbent assay (ELISA) kit. Results: There was a statistically significant difference in sHLA-E levels between GERD patients and healthy cont
... Show MoreThe current research aims to identify the types and rates and the reasons for the crimes that are with the origin and sexual scattered deviation between the fabric of Iraqi society, which reticent about because of the culture of the community, where he offered a researcher investigator justice and tribal leaders and lawyers about proportion and the types and causes of crime is the origin of sexual deviance and finally a question asked a researcher in 1000 young lived their adolescence days of the former regime (1979-2003) from going to brothels researcher found that 920 people and 92% had gone to the house to practice adultery and that 70 of them, and by 7% had engaged in masturbation only and that 10 of them have not committed anything
... Show MoreAddressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreCharacterized the Middle East has geographic, economic, and geostrategic peculiarities, but it suffers from many problems, such as disagreement over what it means as a concept, or what it represents of a geographic extension. The question is related to the ambiguity surrounding the concept of the Middle East? The purpose of its launch? As it relates to its geostrategic, economic, and geo-cultural importance? And manifestations of this importance? And to what extent he retained his value in the strategies of the major powers? Research hypotheses:
-The multiplicity of concepts for the Middle East region, with international political and Geostrategic interests.- The geostrategic value of the Middle East has made it a focal point for
... Show MoreObjectives: Recently, there have been important advances in the clinical application of targeted hybrid near-infrared (NIR) fluorescent-radioactive tracers. ICG-99mTc-nanocolloid, for example, is already being used by some centres for sentinel lymph node biopsy in head and neck cancer. The radioactive component allows imaging at depths which would not be possible with NIR alone and, once exposed, the NIR fluorescence reporter can be imaged at very high resolution. Gamma detection is currently carried out with a separate hand-held gamma camera or with a non-imaging probe. Visualisation of NIR fluorescence during surgery requires a dedicated NIR camera, several of which are available commercially. We describe a novel hand-held hybrid NIR-gamm
... Show MoreConflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s
... Show MoreCosmetic products contain variable amounts of nutrients that support microbial growth. Most contaminants in cosmetic products include bacteria such as Staphylococcus, Pseudomonas, Klebsiella, Achromobacter and Alcaligenes. Contaminated water is a likely source of organisms found in cosmetic products. Products such as shampoo, hand and body lotion, facial cleanser, and liquid soaps were analyzed. In this study, out of 60 cosmetic products analyzed, 26.4% were found to be contaminated. Most of the contamination was from bacteria and no fungal contamination was detected. The highest level o
... Show More