Preferred Language
Articles
/
joe-1163
Salt Distribution in a Soil Irrigated by Subsurface Emitter
...Show More Authors

The best design of subsurface trickle irrigation systems requires knowledge of water and salt distribution patterns around the emitters that match the root extraction and minimize water losses. The transient distribution of water and salt in a two-dimensional homogeneous Iraqi soil domain under subsurface trickle irrigation with different settings of an emitter is investigated numerically using 2D-HYDRUS software. Three types of Iraqi soil were selected. The effect of altering different values of water application rate and initial soil water content was investigated in the developed model. The coefficient of correlation (R2) and the root-mean-square error (RMSE) was used to validate the predicted numerical result. This statistical analysis revealed that there was no much difference between the predicted numerical results, and the measured values. R2 varied from 0.75 to 0.93 and the (RMSE) from 0.079 to 0.116. The comparison confirms the accuracy of the developed model, and it shows that it can be used to simulate the front wetting patterns of water and salt distribution under subsurface trickle irrigation systems. The simulation outcome showed that as the distance from the emitter increased, soil salinity far from the emitter decreased. As expected, irrigation duration and amount affects the dimension of the solute distribution.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Curtin University
Gas hydrates investigation: flow assurance for gas production and effects on hydrate-bearing sediments
...Show More Authors

This thesis was aimed to study gas hydrates in terms of their equilibrium conditions in bulk and their effects on sedimentary rocks. The hydrate equilibrium measurements for different gas mixtures containing CH4, CO2 and N2 were determined experimentally using the PVT sapphire cell equipment. We imaged CO2 hydrate distribution in sandstone, and investigated the hydrate morphology and cluster characteristics via μCT. Moreover, the effect of hydrate formation on the P-wave velocities of sandstone was investigated experimentally.

Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Some Subclasses of Univalent and Bi-Univalent Functions Related to K-Fibonacci Numbers and Modified Sigmoid Function
...Show More Authors

            This paper is interested in certain  subclasses of univalent and bi-univalent functions concerning  to shell- like curves connected with k-Fibonacci numbers involving modified Sigmoid activation function θ(t)=2/(1+e^(-t) ) ,t ≥0 in unit disk |z|<1 . For estimating of the initial coefficients |c_2 | , |c_3 |, Fekete-Szego ̈ inequality and the  second Hankel determinant have been investigated for the functions in our classes. 

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Science
Determination of Differential Cross-Section of (n+89Y) Elastic and Inelastic Scattering using Eikonal Approximation
...Show More Authors

     Neutron differential-elastic and inelastic scattering cross-sections of Yttrium-89 isotope were calculated at energies 8,10,12,14, and 17 MeV, at angles distributed between 20o and 180o in the center of mass frame. The obtained results data were interpreted using a spherical optical potential model and Eikonal approximation, to examine the effect of the first-order Eikonal correction on the effective potential. The real and imaginary parts of optical potential were calculated. It was found that the nominal imaginary potential increase monotonically while the effective imaginary one has a pronounced minimum around r = 6fm and then increases. The analysis of the relative energy of the projectile and reaction

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study and Numerical Simulation of Sheet Hydroforming Process for Aluminum Alloy AA5652
...Show More Authors

 Abstract   

Lightweight materials is used in the sheet metal hydroforming process,  because it can be adapted to the manufacturing of complex structural components into a single body with high structural stiffness. Sheet hydroforming has been successfully developed in industry such as in the manufacturing of the components of automotive.The aim of this study is to simulate the experimental results ( such as the amount of pressure required to hydroforming process, stresses, and strains distribution)  with results  of finite element analyses (FEA)  (ANSYS 11)  for aluminum alloy (AA5652) sheets with  thickness (1.2mm) before heat treatm

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 17 2019
Journal Name
Iraqi Journal Of Physics
Density distributions, form factors and reaction cross sections for exotic 11Be and 15C nuclei
...Show More Authors

The ground state proton, neutron and matter densities of exotic 11Be and 15C nuclei are studied by means of the TFSM and BCM. In TFSM, the calculations are based on using different model spaces for the core and the valence (halo) neutron. Besides single particle harmonic oscillator wave functions are employed with two different size parameters  Bc and Bv.  In BCM, the halo nucleus is considered as a composite projectile consisting of core and valence clusters bounded in a state of relative motion. The internal densities of the clusters are described by single particle Gaussian wave functions.

 Elastic electron scattering proton f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Investigation of the Nuclear Structure of Some Ni and Zn Isotopes with Skyrme-Hartree-Fock Interaction
...Show More Authors

The inelastic C2 form factors and the charge density distribution (CDD) for 58,60,62Ni and 64,66,68Zn nuclei has been investigated by employing the Skyrme-Hartree-Fock method with (Sk35-Skzs*) parametrization. The inelastic C2 form factor is calculated by using the shape of Tassie and Bohr-Mottelson models with appropriate proton and neutron effective charges to account for the core-polarization effects contribution. The comparison of the predicted theoretical values was conducted with the available measured data for C2 and CDD form factors and showed very good agreement.

View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Jurisprudence of the narratives Jurisprudence of the narratives of Mother of the Believers “Um Salmah: (may God bless her) agreed upon between Bukhari and Muslm in respect to fasting, Hajj” pilgrimage” and Sharia duration : The life of the mother of the believers, Umm Salamah, the jurisprudence of the narratives of Umm Salamah, agreed upon between Bukhari and Muslim
...Show More Authors

Abstract

This research’s goal is to  restore and to revive the jurisprudence of  Mother of Believers (Um alMuaamineen) “Um Salmah” "may God bless her", and to highlight her outstanding assimilation and understanding of religion and her conscious thought.  The current research is a comparative scientific theoretical study  represented in the comparison of  jurisprudence of “Um Salamah” with Hadiths  of  fasting  and pilgrimage rules as well as the duration  mentioned in jurisprudence  of  for doctrines( 4 schools of thought )to identify these hadiths with the inclusion and discussion of their evidence.

The current research included two topics: the first one is to identify and introduce

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 24 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing digital documents using digital watermarking
...Show More Authors

     The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents.  But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..

In this research LSB  technique  has been used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Engineering
Experimental Evaluation of the Strut-and-Tie Model Applied to Deep Beam with Near-Load Openings
...Show More Authors

It is commonly known that Euler-Bernoulli’s thin beam theorem is not applicable whenever a nonlinear distribution of strain/stress occurs, such as in deep beams, or the stress distribution is discontinuous. In order to design the members experiencing such distorted stress regions, the Strut-and-Tie Model (STM) could be utilized. In this paper, experimental investigation of STM technique for three identical small-scale deep beams was conducted. The beams were simply supported and loaded statically with a concentrated load at the mid span of the beams. These deep beams had two symmetrical openings near the application point of loading. Both the deep beam, where the stress distribution cannot be assumed linear, and the ex

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref