Diverting river flow during construction of a main dam involves the construction of cofferdams, and tunnels, channels or other temporary passages. Diversion channels are commonly used in wide valleys where the high flow makes tunnels or culverts uneconomic. The diversion works must form part of the overall project design since it will have a major impact on its cost, as well as on the design, construction program and overall cost of the permanent works. Construction costs contain of excavation, lining of the channel, and construction of upstream and downstream cofferdams. The optimization model was applied to obtain optimalchannel cross section, height of upstream cofferdam, and height of downstream cofferdamwith minimum construction cost
... Show MoreAccurate calculation of transient overvoltages and dielectric stresses from fast-front excitations is required to obtain an optimal dielectric design of power components subjected to these conditions, which are commonly due to switching and lightning, as well as utilization of power-electronic devices. Toroidal transformers are generally used at the low voltage level. However, recent investigations and developments have explored their use at the medium voltage level. This paper analyzes the model-based improvement of the insulation design of medium voltage toroidal transformers. Lumped and distributed parameter models are used and compared to predict the transient response and dielectric stress along the transformer winding. The parameters
... Show MoreTo reduce the effects of discharging heated water disposed into a river flow by a single thermal source, two parameters were changed to get the minimum effect using optimization. The first parameter is to distribute the total flow of the heated water between two disposal points (double source) instead of one and the second is to change the distance between these two points. In order to achieve the solution, a two dimensional numerical model was developed to simulate and predict the changes in temperature distribution in the river due to disposal of the heated water using these two points of disposal.
MATLAB-7 software was used to build a program that could solve the governing partial equations of thermal pollution in rivers by using t
This work includs synthesis of several Schiff bases by condensation of 6- methoxy – 2- amino benzothiazole with some aldehydes and ketones (2- hydroxyl benzaldehyde, 4- hydroxyl benzaldehyde, 4- N,N –dimethy amino acetophenone, benzophenone) to abtain schiff bases (1-5). These schiff bases were found to react with phthalate anhydride to give oxazepine derivatives (6-10) that were reacted with primary aromatic amines to give Diazepine derivatives (11-15). Besides, we prepared new tetrazole derivatives (16-20) from the reaction of the prepared Schiff bases with sodium azide in the prepared compounds that were characterized by physical properties, FT-IR and some of the 1H-NMR and 13C –NMR spectroscopy.
The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show MoreThe performance of H2S sensor based on poly methyl methacrylate (PMMA)-CdS nanocomposite fabricated by spray pyrolysis technique has been reported. XRD pattern diffraction peaks of nano CdS has been indexed to the hexagonally wurtzite structured The nanocomposite exhibits semiconducting behavior with optical energy gap of4.06eV.SEM morphology appears almost tubes like with CdS/PMMA network. That means the addition of CdS to polymer increases the roughness in the film and provides high surface to volume ratio, which helps gas molecule to adsorb on these tubes. The resistance of PMMA-CdS nanocomposite showed a considerable change when exposed to H2S gas. Fast response time to detect H2S gas was achieved by using PMMA-CdS thin film sensor. The
... Show MoreWe have provided in this research model multi assignment with fuzzy function goal has been to build programming model is correct Integer Programming fogging after removing the case from the objective function data and convert it to real data .Pascal triangular graded mean using Pascal way to the center of the triangular.
The data processing to get rid of the case fogging which is surrounded by using an Excel 2007 either model multi assignment has been used program LNDO to reach the optimal solution, which represents less than what can be from time to accomplish a number of tasks by the number of employees on the specific amount of the Internet, also included a search on some of the
... Show MoreIn this paper, the Azzallini’s method used to find a weighted distribution derived from the standard Pareto distribution of type I (SPDTI) by inserting the shape parameter (θ) resulting from the above method to cover the period (0, 1] which was neglected by the standard distribution. Thus, the proposed distribution is a modification to the Pareto distribution of the first type, where the probability of the random variable lies within the period The properties of the modified weighted Pareto distribution of the type I (MWPDTI) as the probability density function ,cumulative distribution function, Reliability function , Moment and the hazard function are found. The behaviour of probability density function for MWPDTI distrib
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show More