This paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groynes, the bed shear stress is decreased with the increase in the spacing between Groynes, as well as and the best spacing between the double elliptic Groynes is twice of the Groyne width. Moreover, the used number of Groynes has no much impact on velocity and shear stress values.
Concentrated research topic in the study of variables key to the work of offices of inspectors Amyin ، a (re- design function، and performance Organisational ) and took this message to know the nature of the relationship and the impact of the dimensions of the re- design function as a variable interpretative through its dimensions، is ( the diversity of skill، selecting the task ، the importance of task، autonomy، feedback )، and performance Organisational variable responsive through two dimensions are ( effectiveness ، efficiency )، and in order to test the research hypotheses were absorbed variables in the form of a questionnaire and were questionnaire primary means of gatheri
... Show MoreTelevision culture has become the most dangerous of our time. It manipulates with minds and hearts together; and forms consciousness. It transforms societies into actual forces rejecting certain principles by guiding the media landscape through visible connotations acceptable to the public; or provokes the citizen against elements that put a burden on the viewer or the public in order to create a positive reaction to the subject of combating terrorism by combining these ads in line with what the public wants of security and tranquility and a decent living after suffering from terrorism in the past years.
Therefore, this research deals with television advertisements as one of the most important fo
... Show MoreThe research deals with the important and modern two subject (career path and the type of training program), and tries to find identify the extent of the impact of the requirements of a career path in determining the type of training program in the Ministry of Oil.
In order to achieve the aim of the research was the formulation of the following hypothesis: the impact of the requirements of the career path a meaningful moral influence in determining the type of training program.
The survey was adopted in the search, and sample consisted of (75) people were a factor in the Oil Ministry of People's managers and officials and staff, and used the questionnaire as an es
... Show MoreInfertility is a disease of the reproductive system defined by the failure to achieve a clinical pregnancy after 12 months or more of regular unprotected sexual intercourse. Worldwide, infertility affects approximately 15% of all couples trying to conceive. Male infertility is responsible for about 50% of the infertility cases. Chromosomal abnormalities and Y-chromosome microdeletions are the most common genetic causes of male infertility. Klinefelter syndrome (KS) is the most prevalent factor of the chromosomal abnormality in the infertile male. Azoospermia Factor (AZF) microdeletions located on the Y chromosome are one of the recurrent genetic cause of male infertility. This study aims to investigate the prevalence of chromosomal anoma
... Show MoreDirectional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show MoreABSTRACT
Threw this research to the following:
1 - Know the impact of strategy Puglia in the collection of the rules of the Arabic language
students at the Institute of preparation parameters .
2 - Know the impact of the retention strategy in Puglia collection rules Arabic language
students at the Institute of preparation parameters .
To verify the status Mmermaa Find researcher Elsafreeten following two hypotheses :
1 - There is no statistically significant difference between the average score for the collection
of the fourth grade students at the Institute for the preparation of material parameters who
were studying grammar strategy Puglia and average grades collectible fourth grade
students at the Institu
In this paper, the effective computational method (ECM) based on the standard monomial polynomial has been implemented to solve the nonlinear Jeffery-Hamel flow problem. Moreover, novel effective computational methods have been developed and suggested in this study by suitable base functions, namely Chebyshev, Bernstein, Legendre, and Hermite polynomials. The utilization of the base functions converts the nonlinear problem to a nonlinear algebraic system of equations, which is then resolved using the Mathematica®12 program. The development of effective computational methods (D-ECM) has been applied to solve the nonlinear Jeffery-Hamel flow problem, then a comparison between the methods has been shown. Furthermore, the maximum
... Show Moreفي هذا البحث، تم تنفيذ الطريقة الحسابية الفعالة (ECM) المستندة إلى متعددة الحدود القياسية الأحادية لحل مشكلة تدفق جيفري-هامل غير الخطية. علاوة على ذلك، تم تطوير واقتراح الطرق الحسابية الفعالة الجديدة في هذه الدراسة من خلال وظائف أساسية مناسبة وهي متعددات الحدود تشيبشيف، بيرنشتاين، ليجندر، هيرمت. يؤدي استخدام الدوال الأساسية إلى تحويل المسألة غير الخطية إلى نظام جبري غير خطي من المعادلات، والذي يتم حله بع
... Show MoreA numerical investigation is adopted for two dimensional thermal analysis of rocket thrust chamber wall (RL10), employing finite difference model with iterative scheme (implemented under relaxation factor of 0.9 for convergence) to compute temperature distribution within thrust chamber wall (which is composed of Nickel and Copper layers). The analysis is conducted for different boundary conditions: only convection boundary conditions then combined radiation, convection boundary conditions also for different aspect ratio (AR) of cooling channel. The results show that Utilizing cooling channels of high aspect ratio leads to decrease in temperature variation across thrust chamber wall, while no effects on heat transferred to the
... Show More