Seepage occurs under or inside structures or in the place, where they come into contact with the sides under the influence of pressure caused by the difference in water level in the structure U / S and D / S. This paper is designed to model seepage analysis for Kongele (an earth dam) due to its importance in providing water for agricultural projects and supporting Tourism sector. For this purpose, analysis was carried out to study seepage through the dam under various conditions. Using the finite element method by computer program (Geo-Studio) the dam was analysed in its actual design using the SEEP / W 2018 program. Several analyses were performed to study the seepage across Kongele dam in several cases, including when the reservoir was empty, and at the normal and maximum water level. The final results of the analysis show that the dam is safe.
Floods caused by dam failures can cause huge losses of life and property, especially in estuarine areas and valleys. In spite of all the capabilities and great improvements reached by man in the construction of dams and their structures, they will remain helpless before the powerful forces of nature, especially those related to tectonic activation, and the occurrence of earthquakes of different intensities.
The region extending from the Ilisu Dam in Turkey to the Mosul Dam in Iraq was chosen as an area for this study, and the HEC-RAS application was used to simulate the collapse of the Ilisu Dam due to a major earthquake, to know the magnitude of the risks and losses that could result
Diyala Governorate was exposed recently to high flood waves discharged from Hemrin Dam to Diyala River when the dam reached its full capacity. The recently recorded discharge capacity of Diyala River was reduced to just 750m3/s. This exposes cities and villages along the Diyala River to flood risk when discharging the flood waves, which may reach 3000 m3/s. It is important to manage, suggest, and design flood escapes to discharge the flood waves from Hemrin Dam away from Diyala River. This escape branches from Hemrin Lake towards Ashweicha Marsh. One dimensional hydraulic model was developed to simulate the flow within the escape by using HEC-RAS software. Eighty-two cross-sections were ext
... Show MoreMethods of estimating statistical distribution have attracted many researchers when it comes to fitting a specific distribution to data. However, when the data belong to more than one component, a popular distribution cannot be fitted to such data. To tackle this issue, mixture models are fitted by choosing the correct number of components that represent the data. This can be obvious in lifetime processes that are involved in a wide range of engineering applications as well as biological systems. In this paper, we introduce an application of estimating a finite mixture of Inverse Rayleigh distribution by the use of the Bayesian framework when considering the model as Markov chain Monte Carlo (MCMC). We employed the Gibbs sampler and
... Show MoreMagnetosphere is a region of space surrounding Earth magnetic field, the formation of magnetosphere depends on many parameters such as; surface magnetic field of the planet, an ionized plasma stream (solar wind) and the ionization of the planetary upper atmosphere (ionosphere). The main objective of this research is to find the behavior of Earth's magnetosphere radius (Rmp) with respect to the effect of solar wind kinetic energy density (Usw), Earth surface magnetic field (Bo), and the electron density (Ne) of Earth's ionosphere for three years 2016, 2017 and 2018. Also the study provides the effect of solar activity for the same period during strong geomagnetic storms on the behavior of Rmp. F
... Show MoreThere are many tools and S/W systems to generate finite state automata, FSA, due to its importance in modeling and simulation and its wide variety of applications. However, no appropriate tool that can generate finite state automata, FSA, for DNA motif template due to the huge size of the motif template. In addition to the optional paths in the motif structure which are represented by the gap. These reasons lead to the unavailability of the specifications of the automata to be generated. This absence of specifications makes the generating process very difficult. This paper presents a novel algorithm to construct FSAs for DNA motif templates. This research is the first research presents the problem of generating FSAs for DNA motif temp
... Show MoreIn recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur
... Show MoreStable isotopic technique and hydrochemistry was used in studying the water resources interaction of near Haditha Reservoir area, western Iraq. Throughout the study area, 14 groundwater samples (Bashina, Zwachi springs and Wells), 8 surface water samples from the study area, and 7 spring samples were analyzed for 2H and 18O stable isotopes and hydrochemical analysis. In this study, the temperature, altitude and continental effects on the isotopic composition of rain water in Iraq were studied. The climate of the study area is classified as semi-arid to arid region. The results show a variation in the isotopic values of Haditha reservoir and Euphrates river. This variation is due to the effect of the low surface area and the
... Show MoreThis paper is concerned with combining two different transforms to present a new joint transform FHET and its inverse transform IFHET. Also, the most important property of FHET was concluded and proved, which is called the finite Hankel – Elzaki transforms of the Bessel differential operator property, this property was discussed for two different boundary conditions, Dirichlet and Robin. Where the importance of this property is shown by solving axisymmetric partial differential equations and transitioning to an algebraic equation directly. Also, the joint Finite Hankel-Elzaki transform method was applied in solving a mathematical-physical problem, which is the Hotdog Problem. A steady state which does not depend on time was discussed f
... Show More<p>Vehicular ad-hoc networks (VANET) suffer from dynamic network environment and topological instability that caused by high mobility feature and varying vehicles density. Emerging 5G mobile technologies offer new opportunities to design improved VANET architecture for future intelligent transportation system. However, current software defined networking (SDN) based handover schemes face poor handover performance in VANET environment with notable issues in connection establishment and ongoing communication sessions. These poor connectivity and inflexibility challenges appear at high vehicles speed and high data rate services. Therefore, this paper proposes a flexible handover solution for VANET networks by integrating SDN and
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More