This research examines the impact of cornering on the aerodynamic forces and stability of a Nissan Versa (Almera) passenger sedan car by introducing novel modifications. These modifications included single inverted wings with end plates as a front spoiler, double‐element inverted wings with end plates as a rear spoiler, and incorporating the ground as a diffuser under the car trunk. The goal is to enhance the performance and stability of conventional passenger cars. To ensure the accuracy of the numerical data, the study utilized multiple methodologies to model the turbulence model, ultimately selecting the most suitable option. This involved comparing numerical data with wind tunnel experimental data using force balance and pressure distribution. Once validated, the computational fluid dynamics (CFD) was employed to analyze the vehicle's aerodynamic performance relative to the straight‐line condition under cornering conditions. The car simulation in a cornering condition was conducted at a representative Reynolds number based on the vehicle length of about 1.3 × 107. The study discovered that asymmetry was a recurring theme regarding surface pressure distribution, with greater prominence under cornering conditions. All modified models exhibited a more favorable lift‐to‐drag ratio than the baseline, indicating improved aerodynamic efficiency. The underbody double‐element diffuser proved most effective for enhancing fuel efficiency and stability. Mesh refinement with a polyhedral algorithm consisting of 11.27 million elements and a computational domain with a frontal area of 91.8 m2 and a curved length of 31 m (˜7 times car length) was crucial for achieving accurate and repeatable results. The study employed multiple turbulence models within the CFD framework. The realizable k‐ε model was chosen due to its balance between accuracy and computational cost for all Nissan Versa models. These findings are limited to the selected parameters and wind tunnel conditions, and further investigations might be needed for extreme driving scenarios.
It is no secret to every researcher that the choice of a topic for research is not without positive reasons and selected goals, and in this context it seems to me that writing in the subject (testimony of God) is important in many ways; In many places to signify the oneness and sincerity of the Prophet and the prosecution of slaves for their actions in the Hereafter and the control of God Almighty them in the world, which indicates that the subject has to do with the faith and care and orientation towards his study leads to identify the meaning of this testimony and purposes in the context of its receipt and guide to the semantic faces that go to her.
Abstract
A new type of solar air heater was designed, fabricated, and tested in Baghdad, Iraq winter conditions. The heater consists of two main parts. The horizontal section was filled with the black colored iron chip while the vertical part has five pipes filled with Iraqi paraffin wax. A fan was fixed at the exit of the air. Two cases were studied: when the air moved by natural convection and when forced convection moved it. The studied air heater has proven its effectiveness as it heated the air passing through it to high temperatures. The results manifest that using little air movement makes the temperatures, stored energies, and efficiencies of the two studied cases converge
... Show MoreIn the current study, wild land plant specimens were collected during the flowering and fruiting period of these plants in February, April, June, August, and October 2023 from the riparian area of the Dujail River, Salahaldin Province, north of Baghdad, Iraq. Identified and the results showed that the number of these species were: 104 species, belong to 29 plant families, Included 26 dicotyledon families with 76 genera and 96 species. The asteraceae family was the most diverse, with 30 species, followed by Brassicaceae with (12) species. Additionally, there were 13 families represented by only one species in Dujail River which included: Apocynaceae, Berberidaceae, Capparaceae, Caryophyllaceae, Convolvulaceae, Geraniaceae, Lythraceae
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show More