We consider the outflow of water from the peak of a triangular ridge into a channel of finite depth. Solutions are computed for different flow rates and bottom angles. A numerical method is used to compute the flow from the source for small values of flow rate and it is found that there is a maximum flow rate beyond which steady solutions do not seem to exist. Limiting flows are computed for each geometrical configuration. One application of this work is as a model of saline water being returned to the ocean after desalination. References Craya, A. ''Theoretical research on the flow of nonhomogeneous fluids''. La Houille Blanche, (1):22–55, 1949. doi:10.1051/lhb/1949017 Dun, C. R. and Hocking, G. C. ''Withdrawal of fluid through a line sink beneath a free surface above a sloping boundary''. J. Eng. Math. 29:1–10, 1995. doi:10.1007/bf00046379 Hocking, G. ''Cusp-like free-surface flows due to a submerged source or sink in the presence of a flat or sloping bottom''. ANZIAM J. 26:470–486, 1985. doi:10.1017/s0334270000004665 Hocking, G. C. and Forbes, L. K. ''Subcritical free-surface flow caused by a line source in a fluid of finite depth''. J. Eng. Math. 26:455-466, 1992. doi:10.1007/bf00042763 Hocking, G. C. ''Supercritical withdrawal from a two-layer fluid through a line sink", J. Fluid Mech. 297:37–47, 1995. doi:10.1017/s0022112095002990 Hocking, G. C., Nguyen, H. H. N., Forbes, L. K. and Stokes,T. E. ''The effect of surface tension on free surface flow induced by a point sink''. ANZIAM J., 57:417–428, 2016. doi:10.1017/S1446181116000018 Landrini, M. and Tyvand, P. A. ''Generation of water waves and bores by impulsive bottom flux'', J. Eng. Math. 39(1–4):131-170, 2001. doi:10.1023/A:1004857624937 Lustri, C. J., McCue, S. W. and Chapman, S. J. ''Exponential asymptotics of free surface flow due to a line source''. IMA J. Appl. Math., 78(4):697–713, 2013. doi:10.1093/imamat/hxt016 Stokes, T. E., Hocking, G. C. and Forbes, L.K. ''Unsteady free surface flow induced by a line sink in a fluid of finite depth'', Comp. Fluids, 37(3):236–249, 2008. doi:10.1016/j.compfluid.2007.06.002 Tuck, E. O. and Vanden-Broeck, J.-M. ''A cusp-like free-surface flow due to a submerged source or sink''. ANZIAM J. 25:443–450, 1984. doi:10.1017/s0334270000004197 Vanden-Broeck, J.-M., Schwartz, L. W. and Tuck, E. O. ''Divergent low-Froude-number series expansion of nonlinear free-surface flow problems". Proc. Roy. Soc. A., 361(1705):207–224, 1978. doi:10.1098/rspa.1978.0099 Vanden-Broeck, J.-M. and Keller, J. B. ''Free surface flow due to a sink'', J. Fluid Mech, 175:109–117, 1987. doi:10.1017/s0022112087000314 Yih, C.-S. Stratified flows. Academic Press, New York, 1980. doi:10.1016/B978-0-12-771050-1.X5001-3
The main subject of this poem is a chance meeting between Baudelaire and unknown beautiful lady. Her presence represents the far-fetched, magnificent beauty. This beauty forms an aspect of idealism that takes its real existence and disappears immediately.
This emotional poem deals with the continuous despair that dates back to the Romantic age where it was a key topic; the passing woman embodies destiny. All this comes from constant experience and mad love through the poet’s view to a woman paving the way toward the unknown. Baudelaire, however, noticed this unknown through a passer-by that reflected the real and magical image of this unk
... Show MoreIn the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, industry. This paper introduced the simulated model of a proposed self-balancing platform that described the self–balancing attitude in (X-axis, Y-axis, or both axis) under the influence of road disturbance. To simulate the self-balanced platform's performance during the tilt, an integration between Solidworks, Simscape, and Simulink toolboxes in MATLAB was used. The platform's dynamic model was drawn in SolidWorks and exported as a STEP file used in the Simscape Multibody environment. The system is controlled using the proportional-integral-derivative (PID) co
... Show MoreCerium (III), Neodymium (III) and Samarium (III) Complexes existent a wide range of implementation that stretch from their play in the medicinal and pharmaceutical area because of their major significant pharmacological characteristic such as antifungal, anti-cancer, anti-bacterial ,anti-human immunodeficiency virus ,antineoplastic, anti-inflammation,inhibition corrosion,in some industrial (polymers, Azo dye).It is likely to open avenuesto research among various disciplines such as physics, electronics, chemistry and materials science by these complexes that contain exquisitely designed organic molecules.This paper reviews the definition, importance and various applications of Cerium (III), Neodymium (III) and Samarium (III) Complexes anddi
... Show MoreIn this paper, a robust adaptive sliding mode controller is designed for a mobile platform trajectory tracking. The mobile platform is an example of a nonholonomic mechanical system. The presence of holonomic constraints reduces the number of degree of freedom that represents the system model, while the nonholonomic constraints reduce the differentiable degree of freedom. The mathematical model was derived here for the mobile platform, considering the existence of one holonomic and two nonholonomic constraints imposed on system dynamics. The partial feedback linearization method was used to get the input-output relation, where the output is the error functions between the position of a certain point on the platform
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Identity is an influential and flexible concept in social sciences and political studies. The basic sense of identity is looking for uniqueness. In one sense, it is a sign of identification with those we assume they are similar to us or at least in some significant ways they are so. Globalization, migration, modern technologies, media and political conflicts are argued to have a crucial effect on identity representation in terms of the political perspectives specifically in the United States of America. This paper endeavors to investigate how American politicians represent their identities in speeches delivered in different periods of time namely from 2015 to 2018 in terms of the pragmatic paradigm. Three randomly selected speeches by fa
... Show MoreThe Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two mai
... Show MoreObjectives: The demand for orthodontic treatment is nowadays increasing significantly for aesthetic improvement and to correct various kinds of malocclusion, yet the prolonged treatment time remains the main obstacle. This review aimed to demonstrate various orthodontic techniques and highlight the evidence-based successful approaches used for acceleration of orthodontic tooth movement. Materials and Methods: Data and sources of information pertaining to accelerated orthodontic tooth movement premised on English-written articles were searched using electronic databases including Google Scholar, Scopus, PubMed and MEDLINE. Results: This review demonstrated the availability of different surgical and non-surgical methods to enhance tooth movem
... Show More