The present work aims to investigate the aerodynamic characteristics of the winglet cant angle of Boeing 737-800 wing numerically and experimentally. The wing contain two swept angles 38.3o and 29.13o respectively, taper ratio 0.15 and aspect ratio 8.04. The wing involves three types of airfoils sections. Four cant angles for blended winglet have been considered (0o, 34o, 60o, 83.3o). The winglet has been analyzed to find the best cant angle for the wing without and with winglet. These models have been tested theoretically at Reynolds number of 2.06 x106 in order to study the winglet aerodynamic characteristics which consist of coefficient of Drag, coefficient of lift and Lift to drag ratio, pitching moment coefficient and bending moment coefficient for (0o, 2o, 4o, 6o, 8o, 10o) angles of attack. SOLIDWORK 2016 software, was used to design the geometry of the wing and winglet. ANSYS FLUENT 17.0 in three dimensions with (k - ε) turbulent model was used to solve the governing equations. The experimental tests were carried out in an open low subsonic wind tunnel of 70cm × 70cm ×150cm test section at Reynolds number of 4.33 x105. The experimental lift, drag forces and pitching moment measurement were considered by three component balance device at different angles of attack. The results show that 34o cant angle is the best angle, at which 2-3% increase in lift coefficient, 2-3.9% decrease in drag coefficient, 3.5-6% increase in pitching moment coefficient and 3-6.6% increase in lift to drag coefficient by using blended winglet. Good agreement between the experimental and computational results are shown.
Background The traditional management of appendicular mass is an initial conservative treatment followed by interval appendectomy. Recently interval appendicectomy has been questioned.
Objective: The purpose of this study was to clarify the need and the role of interval appendicectomy after successful initial conservative treatment.
Method: This is a prospective study conducted in a major hospital in Basra from April 2006 to Septemper2010, included 65 patients with appendicular mass which subsequently proved postinflammmatory (phlegmonous) changes of the appendix were treated conservatively.
Results: Routine interval appendicectomy was not performed and needed after successful treatment in the majority of the patients (84.6%). F
Melanoides tuberculata (O. F. Müller, 1774), a freshwater snail native to eastern Mediterranean, eastern Africa, southeast Asia, southern Asia, India, and Malaysia, it is an effective invader and is now nearly globally distributed. This snail has been studied with interest because of its rapidly distributed, and because of being can serve as compatible intermediate host for many of trematodes in the world. We have summarized information from many articles in order to highlight the most important aspects of this invader snail life.
Specialized Escherichia coli (E. coli) isolates, called uropathogenic E. coli (UPEC), cause most of urinary tract infections (UITs). Once bacteria reached the urinary tract of the host, they have to adhere to the host cell for the colonization. For this purpose, bacteria have different structures including fimbrial adhesins. Most of the UPECs contain type 1 fimbriae encoded by fim operon (fimB, E, A, I, C, D, F, G, H) which is responsible for the adhesive ability in these isolates. Ninety-four isolates of UPEC were obtained from UTI patients in Baghdad hospitals and their diagnosis were confirmed by the PCR method using 16srDNA as a housekeeping gene. The UPEC isolates were tested for their ability of adherence to the urothelial cells obtai
... Show MoreThis paper presents a study to investigate the behavior of post-tensioned segmental concrete beams that exposed to high-temperature. The experimental program included fabricating and testing twelve simply supported beams that divided into three groups depending on the number of precasting concrete segments. All specimens were prepared with an identical length of 3150 mm and differed in the number of the incorporated segments of the beam (9, 7, or 5 segments). To simulate the genuine fire disasters, nine out of twelve beams were exposed to a high-temperature flame for one hour. Based on the standard fire curve (ASTM – E119), the temperatures of 300◦C (572◦F), 500◦C (932◦F), and 700◦C (1292◦F) were adopted. Consequently,
... Show MoreIn this work, the switching nonlinear dynamics of a Fabry-Perot etalon are studied. The method used to complete the solution of the differential equations for the nonlinear medium. The Debye relaxation equations solved numerically to predict the behavior of the cavity for modulated input power. The response of the cavity filled with materials of different response time is depicted. For a material with a response time equal to = 50 ns, the cavity switches after about (100 ns). Notice that there is always a finite time delay before the cavity switches. The switch up time is much longer than the cavity build-up time of the corresponding linear cavity which was found to be of the order of a few round-trip ti
... Show MoreThe operation of production planning is a difficult operation and it's required High effect and large time especially it is dynamic activity which it's basic variables change in continuous with the time, for this reason it needs using one of the operation research manner (Dynamic programming) which has a force in the decision making process in the planning and control on the production and its direct affect on the cost of production operation and control on the inventory.
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreThis paper presents a study to investigate the behavior of post-tensioned segmental concrete beams that exposed to high-temperature. The experimental program included fabricating and testing twelve simply supported beams that divided into three groups depending on the number of precasting concrete segments. All specimens were prepared with an identical length of 3150 mm and differed in the number of the incorporated segments of the beam (9, 7, or 5 segments). To simulate the genuine fire disasters, nine out of twelve beams were exposed to a high-temperature flame for one hour. Based on the standard fire curve (ASTM – E119), the temperatures of 300◦C (572◦F), 500◦C (932◦F), and 700◦C (1292◦F) were adopted. Consequently,
... Show MoreHuman Resources Management Practices (HRMP) and managerial control represent two academic fields that have been and still are the focus of many studies. However, merging both fields and studying the relationship that connects them and also the role that HRMP play in achieving the requirements of managerial control represents a new and novel study according to the available literature in these fields.
To achieve these goals, this study has been conducted, using the surveying questionnaire method, on a sample of ten general inspector offices in Iraq that work in the field of control for ministries and independent committees. A questionnaire has been used to collect the data which was analyzed with several s
... Show More