Preferred Language
Articles
/
-oYnsoYBIXToZYALk7CF
Molding and simulation sedimentation process using finite difference method
...Show More Authors
Abstract<p>The goal of this research is to develop a numerical model that can be used to simulate the sedimentation process under two scenarios: first, the flocculation unit is on duty, and second, the flocculation unit is out of commission. The general equation of flow and sediment transport were solved using the finite difference method, then coded using Matlab software. The result of this study was: the difference in removal efficiency between the coded model and operational model for each particle size dataset was very close, with a difference value of +3.01%, indicating that the model can be used to predict the removal efficiency of a rectangular sedimentation basin. The study also revealed that the critical particle size was 0.01 mm, which means that most particles with diameters larger than 0.01 mm settled due to physical force, while most particles with diameters smaller than 0.01 mm settled due to flocculation process. At 10 m from the inlet zone, the removal efficiency was more than 60% of the total removal rate, indicating that increasing basin length is not a cost-effective way to improve removal efficiency. The influence of the flocculation process appears at particle sizes smaller than 0.01 mm, which is a small percentage (10%) of sieve analysis test. When the percentage reaches 20%, the difference in accumulative removal efficiency rises from +3.57% to 11.1% at the AL-Muthana sedimentation unit.</p>
Publication Date
Mon Sep 22 2025
Journal Name
Al–bahith Al–a'alami
Persuasive Sentimental Method in the Electronic Newspapers of Terrorist Organizations - A research drawn from a Master Degree thesis
...Show More Authors

The paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Implication of Yield Lines Theory in Method Three of the ACI Code for Two-Way Reinforced Concrete Slabs
...Show More Authors
Abstract<p>Reinforced concrete slabs are one of the most important and complicated elements of a building. For supported edges slabs, if the ratio of long span to short span is equal or less than two then the slab is considered as two-way slab otherwise is consider as one-way slab. Two-way reinforced concrete slabs are common in use in reinforced concrete buildings due to geometrically arrangement of columns suggested by architects who prefer a symmetric distribution of columns in their plans. Elastic theory is usually used for analysis of concrete slabs. However, for several reasons design methods based on elastic principles are limited in their function. Correspondingly, limit state analysis o</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Study of (Zn0.7 Mn0.3-x Ag0.3 Fe2O4) ferrite nanoparticles synthesized by auto combustion method for NO2 gas sensing
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Oct 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The impact properties of strategic thinking in the stages of the application Business process re-engineering: A survey Study of the consultant of a sample of managers and their assistants and consultants in the General Company for Cotton Industries
...Show More Authors

Need organizations today to move towards strategic thinking which means analyzing situations faced by particular challenges of change in the external environment, which makes it imperative for The Organization That to reconsider their strategies and orientations and operations, a so-called re-engineering to meet those challenges and pressures, to try to achieve improvement root in the installation of the organization and methodscompletion of its work towards achieving high levels of performance and that is reflected to achieve its objectives, and this is what aims to Current search to deal with implications characteristics of strategic thinking in the stages of application re-engineering business of the company General Industries

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jul 05 2018
Journal Name
Eurasip Journal On Wireless Communications And Networking
Positioning and guiding educational robots by using fingerprints of WiFi and RFID array
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Combining Arabic Nested Noun Compound and Collocation Extraction Using Linguistic and Statistical Approach
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
3-D OBJECT RECOGNITION USING MULTI-WAVELET AND NEURAL NETWORK
...Show More Authors

This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Nuclear Physics A
Determine the 134–140Nd isotopes identity using IBM and NEF
...Show More Authors

TThe property of 134−140Neodymium nuclei have been studied in framework Interacting Boson Model (IBM) and a new method called New Empirical Formula (NEF). The energy positive parity bands of 134−140Nd have been calculated using (IBM) and (NEF) while the negative parity bands of 134−140Nd have been calculated using (NEF) only. The E-GOS curve as a function of the spin (I) has been drawn to determine the property of the positive parity yrast band. The parameters of the best fit to the measured data are determined. The reduced transition probabilities of these nuclei was calculated. The critical point has been determined for 140Nd isotope. The potential energy surfaces (PESs) to the IBM Hamiltonian have been obtained using the intrin

... Show More
View Publication
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Digital Image Watermarking Using Arnold Scrambling and Berkeley Wavelet Transform
...Show More Authors

Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.

View Publication Preview PDF