Dam operation and management have become more complex recently because of the need for considering hydraulic structure sustainability and environmental protect on. An Earthfill dam that includes a powerhouse system is considered as a significant multipurpose hydraulic structure. Understanding the effects of running hydropower plant turbines on the dam body is one of the major safety concerns for earthfill dams. In this research, dynamic analysis of earthfill dam, integrated with a hydropower plant system containing six vertical Kaplan turbines (i.e., Haditha dam), is investigated. In the first stage of the study, ANSYS-CFX was used to represent one vertical Kaplan turbine unit by designing a three-dimensional (3-D) finite element (FE) model. This model was used to differentiate between the effect of turbine units’ operation on dam stability in accordance to maximum and minimum reservoir upstream water levels, and the varying flowrates in a fully open gate condition. In the second stage of the analysis, an ANSYS-static modeling approach was used to develop a 3-D FE earthfill dam model. The water pressure pattern determined on the boundary of the running turbine model is transformed into the pressure at the common area of the dam body with turbines. The model is inspected for maximum and minimum upstream water levels. Findings indicate that the water stress fluctuations on the dam body are proportional to the inverse distance from the turbine region. Also, it was found that the cone and outlet of the hydropower turbine system are the most affected regions when turbine is running. Based on the attained results, a systematic operation program was proposed in order to control the running hydropower plant with minimized principal stress at selected nodes on the dam model and the six turbines.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreVol. 6, Issue 1 (2025)
For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreThis study is conducted to evaluate the therapeutic and antioxidant effect of lemon juice on some hematological and biochemical parameters. Thirty female mice used in this study were exposed to oxidative stress through giving them hydrogen peroxide in drinking water for 30 days. Animals randomly distributed over 3 groups, each group contained 10 animals and treated as follows: T1 control group (drinking distilled water only), T2 (0.75% hydrogen peroxide in drinking water) and T3 (0.75% hydrogen peroxide in drinking water with daily drenching with 1 mL lemon juice). At the end of the experiment, blood samples were collected from animals for evaluating the following hematological and biochemical parameters: Haemoglobin concentration (Hb),
... Show More