We consider the outflow of water from the peak of a triangular ridge into a channel of finite depth. Solutions are computed for different flow rates and bottom angles. A numerical method is used to compute the flow from the source for small values of flow rate and it is found that there is a maximum flow rate beyond which steady solutions do not seem to exist. Limiting flows are computed for each geometrical configuration. One application of this work is as a model of saline water being returned to the ocean after desalination. References Craya, A. ''Theoretical research on the flow of nonhomogeneous fluids''. La Houille Blanche, (1):22–55, 1949. doi:10.1051/lhb/1949017 Dun, C. R. and Hocking, G. C. ''Withdrawal of fluid through a line sink beneath a free surface above a sloping boundary''. J. Eng. Math. 29:1–10, 1995. doi:10.1007/bf00046379 Hocking, G. ''Cusp-like free-surface flows due to a submerged source or sink in the presence of a flat or sloping bottom''. ANZIAM J. 26:470–486, 1985. doi:10.1017/s0334270000004665 Hocking, G. C. and Forbes, L. K. ''Subcritical free-surface flow caused by a line source in a fluid of finite depth''. J. Eng. Math. 26:455-466, 1992. doi:10.1007/bf00042763 Hocking, G. C. ''Supercritical withdrawal from a two-layer fluid through a line sink", J. Fluid Mech. 297:37–47, 1995. doi:10.1017/s0022112095002990 Hocking, G. C., Nguyen, H. H. N., Forbes, L. K. and Stokes,T. E. ''The effect of surface tension on free surface flow induced by a point sink''. ANZIAM J., 57:417–428, 2016. doi:10.1017/S1446181116000018 Landrini, M. and Tyvand, P. A. ''Generation of water waves and bores by impulsive bottom flux'', J. Eng. Math. 39(1–4):131-170, 2001. doi:10.1023/A:1004857624937 Lustri, C. J., McCue, S. W. and Chapman, S. J. ''Exponential asymptotics of free surface flow due to a line source''. IMA J. Appl. Math., 78(4):697–713, 2013. doi:10.1093/imamat/hxt016 Stokes, T. E., Hocking, G. C. and Forbes, L.K. ''Unsteady free surface flow induced by a line sink in a fluid of finite depth'', Comp. Fluids, 37(3):236–249, 2008. doi:10.1016/j.compfluid.2007.06.002 Tuck, E. O. and Vanden-Broeck, J.-M. ''A cusp-like free-surface flow due to a submerged source or sink''. ANZIAM J. 25:443–450, 1984. doi:10.1017/s0334270000004197 Vanden-Broeck, J.-M., Schwartz, L. W. and Tuck, E. O. ''Divergent low-Froude-number series expansion of nonlinear free-surface flow problems". Proc. Roy. Soc. A., 361(1705):207–224, 1978. doi:10.1098/rspa.1978.0099 Vanden-Broeck, J.-M. and Keller, J. B. ''Free surface flow due to a sink'', J. Fluid Mech, 175:109–117, 1987. doi:10.1017/s0022112087000314 Yih, C.-S. Stratified flows. Academic Press, New York, 1980. doi:10.1016/B978-0-12-771050-1.X5001-3
In this paper, a mathematical model was built for the supply chain to reduce production, inventory, and transportation in Baghdad Company for Soft Drink. The linear programming method was used to solve this mathematical model. We reduced the cost of production by reduced the daily work hours, the company do not need the overtime hours to work at the same levels of production, and the costs of storage in the company's warehouses and agents' stores have been reduced by making use of the stock correctly, which guarantees reducing costs and preserving products from damage. The units transferred from the company were equal to the units demanded by the agents. The company's mathematical model also achieved profits by (84,663,769) by re
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreIn "historical" fiction, characters that never really existed, give expression to the impact of historical events on the people who really did live through them. The result is not history, as an accurate record of actual events, but fiction in which an earlier age is rendered through the personal joys and sufferings of characters. This paper
aims at investigating the historical realities presented in Dickens’s A Tale of Two Cities.
This study was designed to look for certain biochemical markers(serum uric acid and serum peroxynitrite) in women presented with obesity and to compare the level of these markers with non-obese women. A total number of 63 women were recruited from outpatients and private clinics to admit in this study. The patients were grouped into non obese women (Group I) and obese women (Group II). The anthropometric and blood pressure were determined and venous blood was obtained from each patient for determination of C-reactive protein, uric acid and peroxynitrite. The results showed that there were no significant differences in age or in concomitant or associated diseases in both groups except rheumatoid arthritis which account 80% of group I and 25%
... Show MoreSolid waste generation and composition in Baghdad is typically affected by population growth, urbanization, improved economic conditions, changes in lifestyles and social and cultural habits.
A burning chamber was installed to burn cellulosic waste only. It was found that combustion reduced the original volume and weight of cellulosic waste by 97.4% and 85% respectively.
A batch composting study was performed to evaluate the feasibility of co-composting organic food waste with the cellulosic bottom ash in three different weight ratios (w/w) [95/5, 75/25, 50/50].
The composters were kept in controlled aerobic conditions for 7 days. Temperature, moisture, and pH were measured hourly as process succe
... Show MoreCharacterized the Middle East has geographic, economic, and geostrategic peculiarities, but it suffers from many problems, such as disagreement over what it means as a concept, or what it represents of a geographic extension. The question is related to the ambiguity surrounding the concept of the Middle East? The purpose of its launch? As it relates to its geostrategic, economic, and geo-cultural importance? And manifestations of this importance? And to what extent he retained his value in the strategies of the major powers? Research hypotheses:
-The multiplicity of concepts for the Middle East region, with international political and Geostrategic interests.- The geostrategic value of the Middle East has made it a focal point for
... Show MoreAlthough language research has focused on blackmail in general, less attention has been paid to emotional blackmail. To date, researchers could not locate any literature that examines emotional blackmail from a linguistic standpoint. The current study is intended to fill this gap by scrutinizing emotional blackmail from a pragma-stylistic point of view by examining the style of the characters in selected episodes extracted from the American Breaking Bad series. To carry out the study, an eclectic model comprising kinds of emotional blackmailers by Forward and Frazier (1997), Searles’ speech acts (1979), Grice’s maxims (1975), Brown and Levinson’s politeness (1987), Culpeper’s impoliteness (1996), and Simpson’s stylistic le
... Show MoreIn recent years, Wireless Sensor Networks (WSNs) are attracting more attention in many fields as they are extensively used in a wide range of applications, such as environment monitoring, the Internet of Things, industrial operation control, electric distribution, and the oil industry. One of the major concerns in these networks is the limited energy sources. Clustering and routing algorithms represent one of the critical issues that directly contribute to power consumption in WSNs. Therefore, optimization techniques and routing protocols for such networks have to be studied and developed. This paper focuses on the most recent studies and algorithms that handle energy-efficiency clustering and routing in WSNs. In addition, the prime
... Show MoreThe theory of Pilgrims in the Magra is based on Dekru's view that the mgha is considered a pilgrim, and that the pilgrims are pilgrims
Tujia purely exposes the abstract temptation structure, and that the discharge of the Mfezouz Mfarouz is through factors
This theory tends to highlight the role of pilgrim function as a language
There is no preservation unless directed towards a particular outcome. Gemma can include morphine blindness
Or formulas that allow for the presentation of a pilgrimage to a writer in addition to the content of the news, and the guidance of the recipient
In one direction or another.
The orbital masses are one of these morphines and functional components that achieve function
The Togolese