In this study, the thermal buckling behavior of composite laminate plates cross-ply and angle-ply all edged simply supported subjected to a uniform temperature field is investigated, using a simple trigonometric shear deformation theory. Four unknown variables are involved in the theory, and satisfied the zero traction boundary condition on the surface without using shear correction factors, Hamilton's principle is used to derive equations of motion depending on a Simple Four Variable Plate Theory for cross-ply and angle-ply, and then solved through Navier's double trigonometric sequence, to obtain critical buckling temperature for laminated composite plates. Effect of changing some design parameters such as, orthotropy ratio (E1/E2), aspect ratio (a/b), thickness ratio (a/h), thermal expansion coefficient ratio (α2/α1), are investigated, which have the same behavior and good agreement when compared with previously published results with maximum discrepancy (0.5%).
Abstract
In this investigation, Al2O3 nano material of 50nm particles size were added to the 6061 Al aluminium alloy by using the stir casting technique to fabricate the nanocomposite of 10wt% Al2O3. The experimental results observed that the addition of 10wt% Al2O3 improved the fatigue life and strength of constant and cumulative fatigue. Comparison between the S-N curves behaviour of metal matrix (AA6061) and the nanocomposite 10wt% Al2O3 has been made. The comparison revealed that 12.8% enhancement in fatigue strength at 107cycles due to 10wt% nano reinforcement. Also cumulative fatigue l
... Show MorePhase change material (PCM) is considered as one of the most effective thermal energy storage (TES) systems to balance energy supply and demand. A key challenge in designing efficient PCM-based TES systems lies in the enhancement of heat transmission during phase transition. This study numerically examines the privilege of employing twisted-fin arrays inside a shell-and-tube latent heat storage unit to improve the solidification performance. The presence of twisted fins contributes to the dominating role of heat conduction by their curved shapes, which restricts the role of natural convection but largely aids the overall heat-transfer process during solidification. The heat-discharge
Some biological aspects of the zebra mussel, Dreissena polymorpha have been studied at Al-Musayab thermal power plant ,sixty km. south west of Baghdad. Data collected during the period extended from November, 2002 to October, 2003 except for the month of April The population consisted of five age groups; O, I, II, III, and IV which have 0, 1, 2, 3 and 4 annuli respectively. The study also proved the validity of annuli readings for age and growth determination. The average annual growth rates for age groups O,I, II, III, and IV were 5.7, 5.5, 5.4, 5.2 and 5.4 respectively. Average calculated length for laboratory reared mussel was 2.5 mm compared to 5.4 mm in natural environment. Correlation coefficients were very high between age an
... Show More: Sound forecasts are essential elements of planning, especially for dealing with seasonality, sudden changes in demand levels, strikes, large fluctuations in the economy, and price-cutting manoeuvres for competition. Forecasting can help decision maker to manage these problems by identifying which technologies are appropriate for their needs. The proposal forecasting model is utilized to extract the trend and cyclical component individually through developing the Hodrick–Prescott filter technique. Then, the fit models of these two real components are estimated to predict the future behaviour of electricity peak load. Accordingly, the optimal model obtained to fit the periodic component is estimated using spectrum analysis and Fourier mod
... Show MoreOver the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time. In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D
... Show MoreImage Fusion Using A Convolutional Neural Network
The aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we
... Show MoreThe research illustrated that the theory of constraints is "A group of concepts and basics that aim at helping the management in order to determine the difficulties and how to overcome these difficulties through determining the necessary change and how these change can be done efficiently and effectively ".
The research showed that the theory of constraint including its tools calls for magnifying throughput, constricting the product cycle , determining the optimal production mix , utilization of scare resources and canceling the idle time , that achieving throughput increasing then increasing profit .
Moreov
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More