Preferred Language
Articles
/
joe-1289
Investigations on the Impact of Using Elliptic Groynes on the Flow in Open Channels
...Show More Authors

This paper presents a numerical simulation of the flow around elliptic groynes by using CFD ‎software. The flow was simulated in a flume with 4m long, 0.4m wide, ‎and 0.175m ‎high ‎‎with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow ‎‎inlet with a ‎constant the Groyne height of 10cm and a 1cm thickness, and the ‎width of Groynes equals ‎7cm‎. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of ‎0.0057‎m3/sec. The CFD ‎model showed a good ability to simulate the flow ‎around ‎Groynes with ‎ good accuracy. The results of ‎CFD software showed that when using double elliptic Groynes, the bed shear stress is decreased with the ‎increase in the spacing between Groynes, as well as and the best spacing between the double ‎elliptic Groynes is twice of the Groyne width. Moreover, the used number of Groynes has no ‎much ‎impact ‎on velocity and shear ‎stress values.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 05 2026
Journal Name
Journal Of Physical Education
Platform proposal impact in the development of some special physical abilities in the level of achievement of ran (1500) meters of the young players in athletics.
...Show More Authors

View Publication
Publication Date
Mon Jan 02 2012
Journal Name
Karbala Journal Of Medicine
Open Tibial Shaft Fractures Treated By Primary External Fixation And Bone Graft
...Show More Authors

Eprospective study undertaken between January 2007 and January 2011, 58 consecutive cases with compound tibial shaft fractures. All fractures were stabilized by external fixator device AO/ASIF type after failed the manipulation under anesthesia (MUA) to restore the osseous alignment. In 32 patients cancellous bone graft were used from the upper part of the tibia to enhance healing process, all these patients were followed for an average of 8–12 months. Our findings showed that stabilization of the fracture shaft tibia by external fixation with cancellous bone graft had significantly better result, than external fixation alone. We conclude that unilateral, uniplanar external fixation with early bone grafting from upper part of the tibia is

... Show More
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
AN EXPERIMENTAL STUDY OF THE EFFECT OF VORTEX GENERATOR ON THE FLAT-PLATE BOUNDARY LAYER: AN EXPERIMENTAL STUDY OF THE EFFECT OF VORTEX GENERATOR ON THE FLAT-PLATE BOUNDARY LAYER
...Show More Authors

This paper is dealing with an experimental study to show the influence of the geometric characteristics of the vortex generators VG son the thickness of the boundary layer (∂) and drag coefficients (CD) of the flat plate. Vortex generators work effectively on medium and high angles of attack, since they are "hidden" under the boundary layer and practically ineffective at low angles.

            The height of VGs relative to the thickness of the boundary layer enables us to study the efficacy of VGs in delaying boundary layer separation. The distance between two VGs also has an effect on the boundary layer if we take into

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 05 2026
Journal Name
Journal Of The College Of Education
The schools importance at the age of the message and its impact historical thought
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Merge Operation Effect On Image Compression Using Fractal Technique
...Show More Authors

Fractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.

View Publication Preview PDF
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Agriculture And Agricultural Science Procedia
The Influence of the Water Quality on the Droplet Spectrum Produced by Agricultural Nozzles
...Show More Authors

View Publication
Crossref (1)
Clarivate Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
The political and economic repercussions of the Chinese Marshall Plan on the Arab world
...Show More Authors

China is moving towards building the largest economic power in the world, so what does this mean economically and politically for Europe, America, the Middle East and the Arab world? This project is called the expansionist Chinese Marshall Plan which is a revival of the old Silk Road in a new way. It represents the aspirations of the Chinese people and their president, Xi Jinping, to build a transport route from Asia to Europe and a railway plan to transport goods. The purpose of this is to develop the economic growth model, expand into new markets, promote the Chinese currency, and expand economic and political influence in the areas covered by the Chinese initiative. Equal opportunities in distributing investments to these countries, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 19 2022
Journal Name
Arabian Journal For Science And Engineering
Investigation of the Impacts of Nanomaterials on the Micromechanical Properties of Gypseous Soils
...Show More Authors

View Publication Preview PDF
Scopus (34)
Crossref (31)
Scopus Clarivate Crossref