Preferred Language
Articles
/
joe-119
Hydraulic Characteristics and Discharge of Canal Sluice Gate: Practical Approach
...Show More Authors

Simplifying formulas that are used for calculations and design are the aim of researchers. For present work, the approach to distinguish the flow under sluice gate was conducted in a laboratory. The extensive experimental program was done to collect fifty-four data points for both free and submerged flow conditions. The data included different discharges, gate openings, flow depths at upstream as well as the flow depths represent a tail water and at a contracted section for downstream. The collected data are analyzed according to a problematic that may encounter in the field, to present a more straightforward (but with acceptable accurate) practical features equations and charts. Based on the proposed formulas, five methodologies were introduced as a guide for site engineers and beneficiary farmers. As results, necessary calculations should be followed for the purpose of the successful management of surface irrigation project by an investment of the available water to be delivered with minimizing or preventing head losses to ensure acceptable irrigation efficiency up to the farthest outlets.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 12 2025
Journal Name
Journal Wlkalam
Earthquakes in the Holy Qur’an and the Hadith of the Noble Prophet, an intellectual approach
...Show More Authors

Earthquakes in the Holy Qur’an and the Hadith of the Noble Prophet, an intellectual approach

View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
To Domesticate or to Foreignize: An Approach to Translating Fables and Fairy Tales
...Show More Authors

      The present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.

The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Chemosphere
Impact of anaerobically digested silver and copper oxide nanoparticles in biosolids on soil characteristics and bacterial community
...Show More Authors

View Publication
Scopus (18)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sun May 08 2011
Journal Name
Journal Of Planner And Development
The Effect of the Natural and Cultural Environments Factors on the Architectural and Planning Characteristics of Sulaymaniyah Mosques
...Show More Authors

Most of the mosques in the Islamic world fall under specific and known forms and patterns to a large extent, and such patterns have grown and evolved from the few basic and uniform models, but they changed slowly due to the impact with a mixture of changing functional requirements and cultural landscapes because of the variables of time and place to form patterns known and famous in this day across parts of the Islamic world and its borders. There was no exception to these patterns, but small numbers of mosques that were probably the result of personal experiences or improvisational resolutions, or in response to specific or temporary stimuli. However, the emergence of a specific pattern which does not belong to any of these patt

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 10 2018
Journal Name
Iraqi Journal Of Physics
The influence of magnetic field and cathode dimensions on plasma characteristics in hollow cathode system
...Show More Authors

Experimental study on the effect of cylindrical hollow cathode, working pressure and magnetic field on spatial glow distribution and the characteristics of plasma produced by dc discharge in Argon gas, were investigated by image analyses for the plume within the plasma. It was found that the emission intensity appears as a periodic structure with many peaks appeared between the electrodes. Increasing the pressure leads to increase the number of intensity peaks finally converted to continuous form at high pressure, especially with applied of magnetic field, i.e. the plasma is more stable with the presence of magnetic field. The emission intensity study of plasma showed that the intensity has a maximum value at 1.07 mbar pressure and decre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 30 2014
Journal Name
International Journal Of Advanced Research In Science, Engineering And Technology
Structural Characteristics and photoconductivity of Cerium doped Zinc Sulfide Nanoparticles synthesized via coprecipitation method
...Show More Authors

ZnS:Ce3+ nanoparticles were prepared by a simple microwave irradiation method under mild condition. The starting materials for the synthesis of ZnS:Ce3+ quantum dots were zinc acetate (R & M Chemical) as zinc source, thioacetamide as a sulfur source, cerium chloride as cerium source and ethylene glycol as a solvent. All chemicals were analytical grade products and used without further purification. The quantum dots of ZnS:Ce3+ with cubic structure were characterized by X-ray powder diffraction (XRD), the morphology of the film is seen by scanning electron microscopy (SEM) also by field effect scanning electron microscopy (FESEM) and XRD. Upon exposure to 460 nm light at zero bias voltage, ZnS:Ce3+/p-Si showed a high sensitivity of 4000% an

... Show More
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Experimental Study on Tribological Characteristics of AA 6061 Alloy Reinforced with Al2O3 and B4C Particles
...Show More Authors

Two different composite materials were prepared by stir casting method of AA 6061 alloy as a matrix reinforced with two addition different ceramic materials Al2O3 and B4C of grain size   20 µm by 2.5, 5, 7.5 and10% in weight. The composite material with aluminum alloy as a matrix possesses a unique mechanical properties such as: high specific strength and hardness, low density, and high resistance to corrosion and friction wear. This composite is widely used in automotive parts space and marine applications.

Pin-on-disc technique was used to calculate the wear rate for each addition of Al2O3 and B4C particles. Rockwell hardness test and

... Show More
View Publication Preview PDF
Crossref