We consider the outflow of water from the peak of a triangular ridge into a channel of finite depth. Solutions are computed for different flow rates and bottom angles. A numerical method is used to compute the flow from the source for small values of flow rate and it is found that there is a maximum flow rate beyond which steady solutions do not seem to exist. Limiting flows are computed for each geometrical configuration. One application of this work is as a model of saline water being returned to the ocean after desalination. References Craya, A. ''Theoretical research on the flow of nonhomogeneous fluids''. La Houille Blanche, (1):22–55, 1949. doi:10.1051/lhb/1949017 Dun, C. R. and Hocking, G. C. ''Withdrawal of fluid through a line sink beneath a free surface above a sloping boundary''. J. Eng. Math. 29:1–10, 1995. doi:10.1007/bf00046379 Hocking, G. ''Cusp-like free-surface flows due to a submerged source or sink in the presence of a flat or sloping bottom''. ANZIAM J. 26:470–486, 1985. doi:10.1017/s0334270000004665 Hocking, G. C. and Forbes, L. K. ''Subcritical free-surface flow caused by a line source in a fluid of finite depth''. J. Eng. Math. 26:455-466, 1992. doi:10.1007/bf00042763 Hocking, G. C. ''Supercritical withdrawal from a two-layer fluid through a line sink", J. Fluid Mech. 297:37–47, 1995. doi:10.1017/s0022112095002990 Hocking, G. C., Nguyen, H. H. N., Forbes, L. K. and Stokes,T. E. ''The effect of surface tension on free surface flow induced by a point sink''. ANZIAM J., 57:417–428, 2016. doi:10.1017/S1446181116000018 Landrini, M. and Tyvand, P. A. ''Generation of water waves and bores by impulsive bottom flux'', J. Eng. Math. 39(1–4):131-170, 2001. doi:10.1023/A:1004857624937 Lustri, C. J., McCue, S. W. and Chapman, S. J. ''Exponential asymptotics of free surface flow due to a line source''. IMA J. Appl. Math., 78(4):697–713, 2013. doi:10.1093/imamat/hxt016 Stokes, T. E., Hocking, G. C. and Forbes, L.K. ''Unsteady free surface flow induced by a line sink in a fluid of finite depth'', Comp. Fluids, 37(3):236–249, 2008. doi:10.1016/j.compfluid.2007.06.002 Tuck, E. O. and Vanden-Broeck, J.-M. ''A cusp-like free-surface flow due to a submerged source or sink''. ANZIAM J. 25:443–450, 1984. doi:10.1017/s0334270000004197 Vanden-Broeck, J.-M., Schwartz, L. W. and Tuck, E. O. ''Divergent low-Froude-number series expansion of nonlinear free-surface flow problems". Proc. Roy. Soc. A., 361(1705):207–224, 1978. doi:10.1098/rspa.1978.0099 Vanden-Broeck, J.-M. and Keller, J. B. ''Free surface flow due to a sink'', J. Fluid Mech, 175:109–117, 1987. doi:10.1017/s0022112087000314 Yih, C.-S. Stratified flows. Academic Press, New York, 1980. doi:10.1016/B978-0-12-771050-1.X5001-3
The analysis of detective novels has taken different aspects. The linguistic analysis of them, for example, has tackled the linguistic systems of morphology, phonology, syntax, semantics, and pragmatics. In line with the linguistic analysis, this study explores the various pragmatic and stylistic devices realized through detective novels for the purpose of misdirecting and deceiving the reader. The problem is that when readers try to reach to the truth, they face difficulties. They might not reach to the right solution or infer wrong conclusions because writers use some techniques to hide the truth and mislead them. This study aims at examining these techniques and devices; namely, Grice's Maxims and ambiguity as pragmatic devices on the
... Show MoreTeresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce
... Show MoreDigital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-
... Show MorePsychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors. Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to special requirements by the
... Show MoreIn this paper, a robust adaptive sliding mode controller is designed for a mobile platform trajectory tracking. The mobile platform is an example of a nonholonomic mechanical system. The presence of holonomic constraints reduces the number of degree of freedom that represents the system model, while the nonholonomic constraints reduce the differentiable degree of freedom. The mathematical model was derived here for the mobile platform, considering the existence of one holonomic and two nonholonomic constraints imposed on system dynamics. The partial feedback linearization method was used to get the input-output relation, where the output is the error functions between the position of a certain point on the platform
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBackground: Management of immature permanent teeth with necrotic pulp is considered challenging to the clinician. Regeneration of pulp tissue is a relatively new approach for management of these teeth that allow continuation of root maturation rather than formation of just a calcific barrier as in apexification. Method: 9 years-old girl with traumatized upper left central incisor. The clinical and radiographical examinations revealed uncomplicated crown fracture, tenderness to percussion, absence of response to cold vitality test. Diagnostic X-ray revealed open apex with periapical radiolucency. Revascularization was suggested to treat the tooth, starting with irrigation of canal with 5% NaOCl + 3% H2O2, followed by 2 weeks of triple antibi
... Show MoreThe conjunctive ''and'' and its Arabic counterpart ''و'' are discourse markers that express certain meanings and presuppose the presence of other elements in discourse. They are indispensable aids to both the text writers and readers. The present study aims to show that such cohesive ties help the writer to organize his main argument and communicate his ideas vividly and smoothly. They also serve as explicit signals that help readers unfold text and follow its threads as realized in the progression of context. The researcher has utilized the Quirk Model of Semantic Implication for data analysis. A total of 42 (22 for English and 20 for Arabic) political texts selected from different elite newspapers in both Arabic and English for the analy
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More