Preferred Language
Articles
/
nhY6yocBVTCNdQwCCGHC
Flow from a source above a sloping base
...Show More Authors

We consider the outflow of water from the peak of a triangular ridge into a channel of finite depth. Solutions are computed for different flow rates and bottom angles. A numerical method is used to compute the flow from the source for small values of flow rate and it is found that there is a maximum flow rate beyond which steady solutions do not seem to exist. Limiting flows are computed for each geometrical configuration. One application of this work is as a model of saline water being returned to the ocean after desalination. References Craya, A. ''Theoretical research on the flow of nonhomogeneous fluids''. La Houille Blanche, (1):22–55, 1949. doi:10.1051/lhb/1949017 Dun, C. R. and Hocking, G. C. ''Withdrawal of fluid through a line sink beneath a free surface above a sloping boundary''. J. Eng. Math. 29:1–10, 1995. doi:10.1007/bf00046379 Hocking, G. ''Cusp-like free-surface flows due to a submerged source or sink in the presence of a flat or sloping bottom''. ANZIAM J. 26:470–486, 1985. doi:10.1017/s0334270000004665 Hocking, G. C. and Forbes, L. K. ''Subcritical free-surface flow caused by a line source in a fluid of finite depth''. J. Eng. Math. 26:455-466, 1992. doi:10.1007/bf00042763 Hocking, G. C. ''Supercritical withdrawal from a two-layer fluid through a line sink", J. Fluid Mech. 297:37–47, 1995. doi:10.1017/s0022112095002990 Hocking, G. C., Nguyen, H. H. N., Forbes, L. K. and Stokes,T. E. ''The effect of surface tension on free surface flow induced by a point sink''. ANZIAM J., 57:417–428, 2016. doi:10.1017/S1446181116000018 Landrini, M. and Tyvand, P. A. ''Generation of water waves and bores by impulsive bottom flux'', J. Eng. Math. 39(1–4):131-170, 2001. doi:10.1023/A:1004857624937 Lustri, C. J., McCue, S. W. and Chapman, S. J. ''Exponential asymptotics of free surface flow due to a line source''. IMA J. Appl. Math., 78(4):697–713, 2013. doi:10.1093/imamat/hxt016 Stokes, T. E., Hocking, G. C. and Forbes, L.K. ''Unsteady free surface flow induced by a line sink in a fluid of finite depth'', Comp. Fluids, 37(3):236–249, 2008. doi:10.1016/j.compfluid.2007.06.002 Tuck, E. O. and Vanden-Broeck, J.-M. ''A cusp-like free-surface flow due to a submerged source or sink''. ANZIAM J. 25:443–450, 1984. doi:10.1017/s0334270000004197 Vanden-Broeck, J.-M., Schwartz, L. W. and Tuck, E. O. ''Divergent low-Froude-number series expansion of nonlinear free-surface flow problems". Proc. Roy. Soc. A., 361(1705):207–224, 1978. doi:10.1098/rspa.1978.0099 Vanden-Broeck, J.-M. and Keller, J. B. ''Free surface flow due to a sink'', J. Fluid Mech, 175:109–117, 1987. doi:10.1017/s0022112087000314 Yih, C.-S. Stratified flows. Academic Press, New York, 1980. doi:10.1016/B978-0-12-771050-1.X5001-3

Crossref
View Publication
Publication Date
Thu Aug 17 2023
Journal Name
Revista De Gestão Social E Ambiental
Complete Street as a Key for Urban Environment Development
...Show More Authors

Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad.   Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements.   Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
International Journal Of Pure And Apllied Mathematics
A SEMI ANALYTICAL ITERATIVE TECHNIQUE FOR SOLVING DUFFING EQUATIONS
...Show More Authors

View Publication
Crossref (11)
Crossref
Publication Date
Fri Aug 09 2024
Journal Name
Theory And Practice In Language Studies
Fallacy as a Strategy of Argumentation in Political Debates
...Show More Authors

This study aims to study argumentation in political debates by figuring out the logical fallacies employed in the debates of Clinton and Trump, the presidential nominees of the 2016 elections, and Biden and Trump, the leading contenders in the 2020 United States presidential election. The study attempts to answer the questions: (1) What relevance fallacies are adopted in the debate between Trump and Clinton? (2) What rhetorical devices are used to influence the audience and gain voters besides fallacies in the debates selected? The study analyses two texts from two arguments using Damer's (2009) taxonomy of relevance fallacy and rhetorical devices based on Perrine’s (1969) model of communication and interpersonal rhetoric to answe

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Archives Of Medical Research
Galectins: A New Frontier in Gastroesophageal Reflux Disease Research
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Artificial Intelligence Techniques for Colon Cancer Detection: A Review
...Show More Authors

Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Acta Facultatis Medicae Naissensis
A correlation between body mass index and refractive errors
...Show More Authors

Background. Body mass index (BMI) is a person's weight in kilograms (or pounds) divided by the square of height in meters (or feet). Obesity affects a wide spectrum of age groups, from the young to the elderly, and there are several eye diseases related to obesity like diabetic retinopathy, floppy eyelid syndrome, retinal vein occlusion, stroke-related vision loss, age-related macular degeneration, and possibly, refractive errors. Refractive errors (RE) are optical imperfections related to the focusing ability of the eye and are the main cause of visual impairment which may result in missed education and employment opportunities, lower productivity and impaired quality of life. Aim. The study aimed to find an association between bod

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref