The main objective of the present work is to find a method increases the efficiency of the airfoil that is used for blade in wind turbine, wing in aircraft, propeller and helicopter (like NACA 4412). By overcoming the separation of flow at high angle of attacks, a slotted airfoil had been used and solved numerically through connecting the pressure side in the bottom surface with the suction side in the top surface of the airfoil to energize the separated flow. Slot exit, width and slope were considered as a parameters of slot configuration to determine the effective design of consideration. Reynolds number was taken as [1.6 x106 ] and the angle of attacks were ranged from (0o - 20o ). The numerical solution with Ansys Fluent commercial program had been used to solve a fully turbulent N.S. equations with κ-ω SST turbulence model. The method of changing variables with best one among them was adopted to find the design of the slot. The results of flow field and airfoil characteristics for solid and slotted airfoil were described and illustrated in the present work which showed that the airfoil produces higher lift coefficient value and lower drag coefficient as compared with solid airfoil. Moreover, it delays stalling angle of attack to 19o . The slotted airfoil shows an increasing in maximum lift to drag ratio up to 110% at angle of attack 18o . The most effective slot is found at 60% chord, slope 65o and width 1% chord.
Krawtchouk polynomials (KPs) and their moments are promising techniques for applications of information theory, coding theory, and signal processing. This is due to the special capabilities of KPs in feature extraction and classification processes. The main challenge in existing KPs recurrence algorithms is that of numerical errors, which occur during the computation of the coefficients in large polynomial sizes, particularly when the KP parameter (p) values deviate away from 0.5 to 0 and 1. To this end, this paper proposes a new recurrence relation in order to compute the coefficients of KPs in high orders. In particular, this paper discusses the development of a new algorithm and presents a new mathematical model for computing the
... Show More The present study aimed at ((building an educational -learning design based on the theory of Merrill in (CDT) and measuring the effectiveness of this design in the motivation and achievement of the high school fifth grade students to art education in the subject of the history of modern art)). The research community is made of fifth grade preparatory students in the secondary school of Umm Ayman in the Directorate of Education of Baghdad / Ar-Rusafa in a simple random way. The study sample (58 students) was chosen from section (e) to study according to Merrill theory (CDT) and section (d) to study according to the traditional way.
The pilot design of the control and experimental equivalent groups that have partial control in t
In the modern world, wind turbine (WT) has become the largest source of renewable energy. The horizontal-axis wind turbine (HAWT) has higher efficiency than the vertical-axis wind turbine (VAWT). The blade pitch angle (BPA) of WT is controlled to increase output power generation over the rated wind speed. This paper proposes an accurate controller for BPA in a 500-kw HAWT. Three types of controllers have been applied and compared to find the best controller: PID controller (PIDC), fuzzy logic type-2 controller (T2FLC), and hybrid type-2 fuzzy-PID controller (T2FPIDC). This paper has been used Mamdani and Sugeno fuzzy inference systems (FIS) to find the best inference system for WT controllers. Furthermore, genetic algorithm (GA) and particl
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreIn the recent decade, injection of nanoparticles (NPs) into underground formation as liquid nanodispersions has been suggested as a smart alternative for conventional methods in tertiary oil recovery projects from mature oil reservoirs. Such reservoirs, however, are strong candidates for carbon geo-sequestration (CGS) projects, and the presence of nanoparticles (NPs) after nanofluid-flooding can add more complexity to carbon geo-storage projects. Despite studies investigating CO2 injection and nanofluid-flooding for EOR projects, no information was reported about the potential synergistic effects of CO2 and NPs on enhanced oil recovery (EOR) and CGS concerning the interfacial tension (γ) of CO2-oil system. This study thus extensively inves
... Show MoreThis research includes theoretical and evaluation design of a polarizer filter of high transmission in the near IR region of (900-1200nm) for different incidence angles to obtain a long wave and short wave pass filter using analytical calculations. Results refer to a new configuration design in fewer layers than used in previous studies in the long wave pass at incidence angles (45o,50o,55o). Adopted Hafnium dioxide (HfO2) and Magnesium fluoride (MgF2) as coating material at design wavelength (933nm), the study also included design short wave pass polarizer by using the same coating material.
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio
An indoor spraying robot is built in this research to solve numerous challenges associated with manual spraying. The mechanical, hardware and essential technologies used are all detailed and designed. The proposed spraying robot's conceptual design is split into two parts: hardware and software. The mechanical design, manufacturing, electrical, and electronics systems are described in the hardware part, while the control of the robot is described in the software section. This robot's kinematic and dynamic models were developed using three links that move in the x, y, and z directions. The robot was then designed using SolidWorks software to compute each connection's deflection and maximum stresses. The characteristics of the stepper moto
... Show More