The flow measurements have increased importance in the last decades due to the shortage of water resources resulting from climate changes that request high control of the available water needed for different uses. The classical technique of open channel flow measurement by the integrating-float method was needed for measuring flow in different locations when there were no available modern devices for different reasons, such as the cost of devices. So, the use of classical techniques was taken place to solve the problem. The present study examines the integrating float method and defines the parameters affecting the acceleration of floating spheres in flowing water that was analyzed using experimental measurements. The method was investigated theoretically, as well as many experimental tests in a fixed floor laboratory flume were conducted. Different sizes of solid plastic spheres with different weights were used as floats to measure velocities and then discharge computation. The results indicate that the integrating-float technique is feasible and accurate for measuring low flow velocity in open channels. It was desirable to use small floats with specific gravity closer to unity to get more accurate results. The measured velocities and the estimated discharges were compared with discharges obtained using some other common laboratory measuring techniques. Good agreement was obtained between the integrating-float method results with the results of velocities obtained using other measurement techniques, with an error of less than 2.5%.
<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low & multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreThe research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThe exploitation of obsolete recyclable resources including paper waste has the advantages of saving resources and environment protection. This study has been conducted to study utilizing paper waste to adsorb phenol which is one of the harmful organic compound byproducts deposited in the environment. The influence of different agitation methods, pH of the solution (3-11), initial phenol concentration (30-120ppm), adsorbent dose (0.5-2.5 g) and contact time (30-150 min) were studied. The highest phenol removal efficiency obtained was 86% with an adsorption capacity of 5.1 mg /g at optimization conditions (pH of 9, initial phenol concentration of 30 mg/L, an adsorbent dose of 2 g and contact time of 120min and at room temperature).
... Show More