The main objective of the present work is to find a method increases the efficiency of the airfoil that is used for blade in wind turbine, wing in aircraft, propeller and helicopter (like NACA 4412). By overcoming the separation of flow at high angle of attacks, a slotted airfoil had been used and solved numerically through connecting the pressure side in the bottom surface with the suction side in the top surface of the airfoil to energize the separated flow. Slot exit, width and slope were considered as a parameters of slot configuration to determine the effective design of consideration. Reynolds number was taken as [1.6 x106 ] and the angle of attacks were ranged from (0o - 20o ). The numerical solution with Ansys Fluent commercial program had been used to solve a fully turbulent N.S. equations with κ-ω SST turbulence model. The method of changing variables with best one among them was adopted to find the design of the slot. The results of flow field and airfoil characteristics for solid and slotted airfoil were described and illustrated in the present work which showed that the airfoil produces higher lift coefficient value and lower drag coefficient as compared with solid airfoil. Moreover, it delays stalling angle of attack to 19o . The slotted airfoil shows an increasing in maximum lift to drag ratio up to 110% at angle of attack 18o . The most effective slot is found at 60% chord, slope 65o and width 1% chord.
As a result of the development and global openness and the possibility of companies providing their services outside their spatial boundaries that were determined by them, and the transformation of the world due to the development of the means of communication into a large global market that accommodates all products from different regions and of the same type and production field, competition resulted between companies, and the race to obtain the largest market share It ensures the largest amount of profits, and it is natural for the advertising promotion by companies for their product to shift from an advertisement for one product to a competitive advertisement that calls on the recipient to leave the competing product and switch to it
... Show MoreFlexible joint robot (FJR) manipulators can offer many attractive features over rigid manipulators, including light weight, safe operation, and high power efficiency. However, the tracking control of the FJR is challenging due to its inherent problems, such as underactuation, coupling, nonlinearities, uncertainties, and unknown external disturbances. In this article, a terminal sliding mode control (TSMC) is proposed for the FJR system to guarantee the finite-time convergence of the systems output, and to achieve the total robustness against the lumped disturbance and estimation error. By using two coordinate transformations, the FJR dynamics is turned into a canonical form. A cascaded finite-time sliding mode observer (CFTSMO) is construct
... Show MoreIn this research (100* 40* 4 cm) solar cell panel was used in Baghdad at autumn season (2010), to get best solar cell panel angles experimentally, and then a mirror (40*50 cm) is use to concentrate incident sunlight intensity on a panel. At first case we get (Tilt angle ?P =60°and Surface Azimuth angle ?P =36°E) is the best angles and other case, we add a mirror at angle = 120° at bottom of panel, then we get output power (27.48watt) is bigger than without using a mirror (25.16watt). We can benefit from these cases in variety applications.
Poly (viny1 alcohol) (PVA) of 72000 g mol -1 molar mass was cross linked through cold cast esterification with different mol % of MA and EDTA (10 % , 20 % and 30 % ), and two different mol % mixture of MA l EDTA (20 %/5% and 20%/10% .
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe aim of this research is to investigate the effect of economic, social and institutional factors on adoption within the national program for the propagation of high-rank seeds of wheat crop. 170 questionnaires were collected, 50% of them were participants in the program from Wasit and Babil governorates. Probabilistic regression models were used to know this effect, and the possibility of adopting Farmers of improved seeds produced from the national program for the multiplication of seeds of higher grades using the (ADOPT) program. The adoption rate was 0.12%, and the total number of adopters were 12 farmers, at a rate of 14.2%. Tobit model was estimated to find out the impact of the profitability of the dunum, capital, farm si
... Show MoreOptimum perforation location selection is an important study to improve well production and hence in the reservoir development process, especially for unconventional high-pressure formations such as the formations under study. Reservoir geomechanics is one of the key factors to find optimal perforation location. This study aims to detect optimum perforation location by investigating the changes in geomechanical properties and wellbore stress for high-pressure formations and studying the difference in different stress type behaviors between normal and abnormal formations. The calculations are achieved by building one-dimensional mechanical earth model using the data of four deep abnormal wells located in Southern Iraqi oil fields. The magni
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreAbstract
The current research aims to identify the analysis of the questions for the book of literary criticism for the preparatory stage according to Bloom's classification. The research community consists of (34) exercises and (45) questions. The researcher used the method of analyzing questions and prepared a preliminary list that includes criteria that are supposed to measure exercises, which were selected based on Bloom's classification and the extant literature related to the topic. The scales were exposed to a jury of experts and specialists in curricula and methods of teaching the Arabic language. The scales obtained a complete agreement. Thus, it was adapted to become a reliable instrument in this
... Show More