A total of 48 experiments were conducted to investigate the impact of slit weir dimensions and locations on the maximum scour depth and scour area created upstream. The slit weir model was a 110 mm slit opening, and it was installed at the end of the working section in a laboratory flume. The flume was 10.0 m long, 30 cm wide, 30 cm deep, and almost middle. It includes a 2 m working section with a mobile bed with 110 mm in thickness. In the mobile bed, two types of nonuniform sand (with a geometric standard deviation of 1.58 and 1.6) were tested separately. The weir dimensions and location were changed with flow rates. Then dimensions of the slit weir were changed from 60 x 110 mm to 60 x 70 mm (width x height), while the location of the slit weir was changed from the center of the flume to its side. Finally, the flow rates were changed from 2.6 to 8 l/s. The maximum value of scour depth and scour area was recorded 72 mm and 32357 mm2 when the slit height, the flow rate, D50 of the movable bed were 110 mm, 8 l/s, 0.3 mm, respectively.
The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
Mangrove landscaping in the Segara Anakan Lagoon (SAL) is an adaptation pattern of mangrove ecosystems to live and grow in unstable areas. This research aimed to develop a mangrove landscape to mitigate the impacts of ocean waves, currents, and inundation due to climate change. The study was conducted in SAL and Cilacap Coast (CC) using the environmental properties and climate change data. The data obtained were analyzed using mapping and trendline analyses. The results showed that mangrove landscaping in Segara Anakan had four zones with Nypa frutican, Rhizophora styllosa, Aegiceras corniculatum, Rhizophora apiculata, Avicennia marina, Sonneratia alba identified as the best adaptation of mangrove species. Climate change give a high impa
... Show MoreThis paper reports experimental and computational fluid dynamics (CFD) modelling studies to investigate the effect of the swirl intensity on the heat transfer characteristics of conventional and swirl impingement air jets at a constant nozzle-to-plate distance ( L = 2 D). The experiments were performed using classical twisted tape inserts in a nozzle jet with three twist ratios ( y = 2.93, 3.91, and 4.89) and Reynolds numbers that varied from 4000 to 16000. The results indicate that the radial uniformity of Nusselt number (Nu) of swirl impingement air jets (SIJ) depended on the values of the swirl intensity and the air Reynolds number. The results also revealed that the SIJ that was fitted with an insert of y = 4.89, which correspo
... Show MoreThe chemical composition of wastes of pressed grapes and found that the main components of wastes of pressed grapes, represented by the percentage of moisture was 6.47%, and the proportions are 3.71%. Either carbohydrates amounted to 85.77 %, either in fat models using petroleum ether Petroleum ether) was the increase of 0.27%. estimated the percentage of ash in the sampls was 3.78%, either fiber reached 69.47 %,, in addition to the test extracts towards the growth of seven types of bacteria, which included Bacillus subtilis, Bacillus cereus, Bacillus stearothermophilus, Escherishia coli, Staphylococcus aureus, Salmonella typhimurium and Pseudomonas fluorescens and yeast Candida albicans and Kluyveromyces marxianus, ( diffusion method ).
... Show More
... Show MoreNecessary and sufficient conditions for the operator equation I AXAX n*, to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.
The present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu
... Show MoreAfter word war ll, the United States of America pursued a policy of containment aimed at preventing the Soviet Union from penetrating into the countries of the world, especially the regions of the Middle East, Therefore, it worked to emphasize the establishment of relations that include various political, economic and even cultural aspects, and focused its policy in his aspect on Turkey due to its geopolitical position. At a time when Turkey was undergoing developments at various levels and a change in govemment policy after the Demccratic Party came to power, which focused in its foreign policy on strengthening reltions with the West in general and the United States America in particular. The US government was the supporter of Democrat
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More