The hydraulic behavior of the flow can be changed by using large-scale geometric roughness elements in open channels. This change can help in controlling erosions and sedimentations along the mainstream of the channel. Roughness elements can be large stone or concrete blocks placed at the channel's bed to impose more resistance in the bed. The geometry of the roughness elements, numbers used, and configuration are parameters that can affect the flow's hydraulic characteristics. In this paper, velocity distribution along the flume was theoretically investigated using a series of tests of T-shape roughness elements, fixed height, arranged in three different configurations, differ in the number of lines of roughness element. These elements were used to find the best configuration of roughness elements that can be applied to change the flow's hydraulic characteristics. ANSYS Parametric Design Language, APDL, and Computational Fluid Dynamics, CFD, was used to simulate the flow in an open channel with roughness elements. CFD can be used to study the hydrodynamics of open channels under different conditions with inclusive details rather than relying on the costly field and time-consuming. Runs were implemented with different conditions, the discharge, and water depth in upstream and downstream of the flume. T-shape roughness elements with height equal to 3cm placed in three different configurations, two lines, four lines, and fully rough configurations were tested. The results show that the effect of roughness elements increasing with increasing the number of lines of roughness elements. Cases of four lines and fully rough configurations have almost the same hydraulic performance by having the same results of the velocity decrease percentage, which is decreased by approximately about 66% and 61% of the control case's velocity in the zone near the roughness elements consequently. But the difference is that four lines configuration is affected in a part of the test section. This behavior increases the velocity values by about 11% in the other side and by about 10% near the free surface in the case of four lines configuration and increased by about 32% above the roughness elements in a fully rough configuration.
The study aims to find out the extent to which several Iraqi institutional accreditation standards (governance and administration, scientific research, curricula) are applied in two public universities (Baghdad and Middle Technical University) and two private universities (Uruk and Al-Mansour College) by diagnosing strengths and weaknesses and proposing a mechanism and procedures to help educational institution aims to reduce or eliminate the gap. The study stems from the extent of application of several Iraqi institutional accreditation standards represented as it was worked on through observation and field coexistence to reach scientific and practical facts. The method of case study and comparison betwe
... Show MoreIn the present work the nuclear structure of even-even
Ba(A=130-136, Z=56) isotopes was studied using (IBM-1). The reduced matrix element of magnetic dipole moment (11 II f(Ml) II/,) and the magnetic dipole transitions probability B(M 1) were calculated
for one and two bodies of even-even Ba(A=lJ0-136, Z=56). A good
agreement had been found of present with available experimental data.
The result of concentration varying of mixture methane with argon and neon gas are believed to study the change in electrons energy distribution function and then the change of the electrons transport parameters including the drift velocity, the mean energy, characteristics energy and diffusion coefficient. In the present work,a contemporary developed computer, simulation program known as Bolsig+ is being used for calculating the electron transport parameters.
This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreUsing the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show More