In this work, an investigation for the dynamic analysis of thin composite cylindrical and spherical shells is presented. The analytical solution is based upon the higher order shear deformation theory of elastic shells from which the developed equations are derived to deal with orthotropic layers. This will cover the determination of the fundamental natural frequencies and mode shapes for simply supported composites cylindrical and spherical shells.
The analytical results obtained by using the derived equations were confirmed by the finite element technique using the well known Ansys package. The results have shown a good agreement with a maximum percentage of discrepancy, which gives a confidence o
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreLabrotary experiment was conducted to study the effect of different levels of nematode population densities of Meloidogyne spp on seed germination percentage and seedling characteristics of Vigna sinensis, Ahelmoschus esculentus, Cicer arietinum, Helianthus annuus and Rap-hanus sativus. Four different levels of nematode populat-ion densities ranged from 1 to 4 prepared from radish in-fected roots and used as inoculating agent to infect all seed types in the experiment Seed germination percentage of Vigna sinensis and Ablemoschus eseulentus were highly reduced (at 0.01 level of significance) with increased nematode population level from 1 to 4. Seedling length of the remaining seed types were significantly reduced (at 0.01 level of signif
... Show MoreThe consumption of fresh fruits has increased nowadays due to the lifestyle of the consumers. Maintaining the quality and nutritional value of cut fruits during storage is difficult compared to whole fruits. Deterioration of internal and external quality usually occurs in freshly harvested fruits. It is necessary to use different techniques to maintain the quality and increase the shelf life of the freshly cut product. This research studied the effect of treating apple slices with cold plasma once and with filtered water again on quality characteristics (hardness, moisture content, sugar content, carbohydrate content, and color) after being stored for five days. The best treatment was determined using two different pressures of the plasma j
... Show MoreEach project management system aims to complete the project within its identified objectives: budget, time, and quality. It is achieving the project within the defined deadline that required careful scheduling, that be attained early. Due to the nature of unique repetitive construction projects, time contingency and project uncertainty are necessary for accurate scheduling. It should be integrated and flexible to accommodate the changes without adversely affecting the construction project’s total completion time. Repetitive planning and scheduling methods are more effective and essential. However, they need continuous development because of the evolution of execution methods, essent
Introduction: Although soap industry is known from hundreds of years, the development accompanied with this industry was little. The development implied the mechanical equipment and the additive materials necessary to produce soap with the best specifications of shape, physical and chemical properties. Objectives: This research studies the use of vacuum reactive distillation VRD technique for soap production. Methods: Olein and Palmitin in the ratio of 3 to 1 were mixed in a flask with NaOH solution in stoichiometric amount under different vacuum pressures from -0.35 to -0.5 bar. Total conversion was reached by using the VRD technique. The soap produced by the VRD method was compared with soap prepared by the reaction - only method which
... Show MoreTwo field experiments were conducted during the spring season 2020 in Karbala governorate to study the effect of irrigation systems, irrigation intervals, biofertilizers and polymers on some characteristics of vegetative growth and potato production. The results showed that there were significant differences in the values of the average plant height due to the effect of the double interference between the irrigation system and the improvers, The height of potato plant under any irrigation system was superior when adding conditioners compared to the control treatment, as it reached 48.56, 58.00 and 64.33cm when adding polymer, biofertilizer, and polymers+ biofertilizers, respectively compared with the control treatment of 44.64cm in the surf
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show More