Dam break is series phenomenon that can result in fatal consequences and loss of properties. Unfortunately, the observed consequences can only be available after the dam breaks. Therefore, it is important to anticipate what will happen prior to dam break to issue suitable warning and locate the possible risk areas. This study attempts to simulate the case of dam break in Blue Nile at Roseires dam and see its consequences downstream. Roseires dam lies at a distance of 630 km south of Khartoum, Sennar dam lies at about 260 km downstream of Roseires dam. In this study hydraulic model is developed based of Hydraulic Engineering Centre (HEC), River Analysis System (RAS), and HEC- RAS. The HEC-RAS based model is calibrated and validated using observed data of the Blue Nile for several flood years. The calibrated and validated model is used to analyze the impact of flood wave due to dam break failure of Roseires dam to provide the following information: the maximum discharge, the maximum water level, the maximum velocity, the velocity and depth profiles, the flooding extent, etc. Several dam break scenarios that cover the possible failure modes were considered and the scenario that gives the worst situation is present in this paper. Piping is considered as failure mode with different failure parameters. It was found that failure of Roseires dam result in overtopping failure of Sennar dam due to the inability of the Sennar reservoir and dam to withstand the flood wave. The results also indicated that the maximum flood wave resulting from the failure of Roseires dam reaches Khartoum in 4, 6, 7 and 9 days when the maximum flow is 33105, 14724, 13249 and 12443 m3/s respectively the cities (Roseires, Sennar, Wad Medani and Khartoum ). The respective water surface level of flood wave is 481.01, 428.37 and 382.5 m in Roseires, Sennar and Khartoum and the wave speed at Khartoum is 8.97 m/s.
Corrosion rate tests were carried out on carbon steel under concentration cells conditions of oxygen and sodium chloride. The effect of aeration in one compartment on the corrosion rate of both coupled metals was determined. In addition, the effects of time and temperatures on the corrosion rate of both coupled metals and galvanic currents between them were investigated. Corrosion potentials for the whole range of operating conditions under concentration cell conditions were also studied. The results showed that under aeration condition, the formation of concentration cell caused a considerable corrosion rate of the Carbon steel specimens coupled in different concentrations of O2 and NaCl due to the galvanic effect
... Show MoreOne of the most common procedures in oral surgery is the removal of impacted mandibular third molars, often followed by pain, swelling, alveolitis, and trismus. Purpose. To compare the outcomes of the intrasocket application of 1% hyaluronic acid oral gel (HA) and advanced platelet-rich fibrin (A-PRF) on the expected postoperative complications, pain, swelling, and trismus follow the surgical extraction of the impacted mandibular third molar. Material and Methods. A randomized controlled trial was conducted at the Oral and Maxillofacial Surgery Unit, Dental Teaching Hospital. Healthy patients who required surgical removal of the impacted mandibular third molar were divided randomly into three groups. The extraction site of the group
... Show MoreBackground: For decades, the use of naturally accessible materials in treating human disease has been widespread. The goal of this study was to determine the anti-fungal effectiveness /of the lemongrass essential oil (LGEO) versus Candida albicans (C. albicans) adhesion to polymethylmethacrylate (PMMA) materials. Material and methods: LGEO's anti-fungal activity was tested against C. albicans adhesion using the following concentration of LGEO in PMMA monomer (2.5 vol. %, 5 vol. % LGEO) selected from the pilot study as the best two effective concentrations. A total of 40 specimens were fabricated for the candida adherence test and were subdivided into four equal groups: negative control 0 vol. % addition, experimental with 2.5 vol. % and
... Show MoreIn this paper, the interplay among four population species is offered. The system consists of two competitive prey, predator and super predators. The application of the hypothesis of the Sotomayor theorem for local bifurcation around every equilibrium point is adopted. It is detected that the transcritical bifurcation could occur near most of the system's equilibrium points, while saddle-node and pitchfork bifurcation can not be accrued at any of them. Further, the conditions that guarantee the accruing Hopf bifurcation are carried out. Finally, some numerical analysis is illustrated to confirm the analytical results.
In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
With the freedom offered by the Deep Web, people have the opportunity to express themselves freely and discretely, and sadly, this is one of the reasons why people carry out illicit activities there. In this work, a novel dataset for Dark Web active domains known as crawler-DB is presented. To build the crawler-DB, the Onion Routing Network (Tor) was sampled, and then a web crawler capable of crawling into links was built. The link addresses that are gathered by the crawler are then classified automatically into five classes. The algorithm built in this study demonstrated good performance as it achieved an accuracy of 85%. A popular text representation method was used with the proposed crawler-DB crossed by two different supervise
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreFeature selection, a method of dimensionality reduction, is nothing but collecting a range of appropriate feature subsets from the total number of features. In this paper, a point by point explanation review about the feature selection in this segment preferred affairs and its appraisal techniques are discussed. I will initiate my conversation with a straightforward approach so that we consider taking care of features and preferred issues depending upon meta-heuristic strategy. These techniques help in obtaining the best highlight subsets. Thereafter, this paper discusses some system models that drive naturally from the environment are discussed and calculations are performed so that we can take care of the prefe
... Show More