This study was conducted to examine the discharge capacity of the reach of the Tigris River between Kut and Amarah Barrages of 250km in length. The examination includes simulation the current capacity of the reach by using HEC-RAS model. 247cross sections surveyed in 2012 were used in the simulation. The model was calibrated using observed discharges of 533, 800, 1025 and 3000m3/s discharged at Kut Barrage during 2013, 1995, 1995 and 1988, respectively, and its related water level at three gauge stations located along the reach. The result of calibration process indicated that the lowest Root Mean Square Error of 0.095 can be obtained when using Manning’s n coefficient of 0.026, 0.03 for the Kut- Ali Al Garbi and Ali Al Garbi- Amarah reaches respectively, and 0.03 for the flood plain of the whole reach under study. The reach under study has two lateral inflow streams, UmAljury, which joins Tigris River at station 51km, and Aljabab, which joins Tigris River at station 57km. The discharge of Aljabab varies between 0 and 400m3/s and the discharge of UmAljury varies between 0 and 50m3/s. The results showed that the current capacity of the main channel of the reach of the Tigris River between Kut and Amarah Barrages is 400m3/s. The water levels kept less 1m than both levees in case of discharging 1800m3/s from Kut Barrage, with no lateral inflows, and 1700m3/s with lateral inflow. The reach of Tigris River fails to accommodate the flood discharge of 3300m3/s which is the discharge of the flood of 1988 measured at Kut Barage. It can be concluded that the reach had large amount of sediment for the period from 1988 to 2012 and the reach capacity reduced to about half its capacity of 1988 during this period. The results of removing 12 islands and 2 sidebars by reshaping the current condition into trapezoidal cross-section will decrease the surface water levels by 20cm and flow of 1900m3/s can be discharged safely at Kut Barrage without any lateral inflow and 1800m3/s with lateral inflow from the tributaries. While, expand 58 narrow cross-sections that choking the flow, the water levels along the reach are lowered by an average of 20cm in addition to that 20cm when modifying the cross-sections at the islands and sidebars. In this case, flow of 2100m3/s can safely be discharged from Kut Barrage without any lateral inflow and 1900m3/s with lateral inflow. The result when modifying additional 111 cross-sections showed that the reach can safely accommodate a flood wave of 3300m3/s from Kut Barrage without any lateral inflow and 3000m3/s with lateral inflow.
When scheduling rules become incapable to tackle the presence of a variety of unexpected disruptions frequently occurred in manufacturing systems, it is necessary to develop a reactive schedule which can absorb the effects of such disruptions. Such responding requires efficient strategies, policies, and methods to controlling production & maintaining high shop performance. This can be achieved through rescheduling task which defined as an essential operating function to efficiently tackle and response to uncertainties and unexpected events. The framework proposed in this study consists of rescheduling approaches, strategies, policies, and techniques, which represents a guideline for most manufacturing companies operatin
... Show MoreThere is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreAn excellent reputation earned by initiating and practicing sustainable business practices has additional benefits, of which are reducing environmental incidents and an improvement in operational efficiency as this has the potential to help firms improve on productivity and bring down operating costs. Taken further, with ever-increasing socially and environmentally-conscious investors and the public alike, this act of natural resources management could have a significant implication on market value and income of the practicing firms.
The above proposition has been supported by sustainable business practices literature that is continuously conversing and deliberating upon the impact of efficient resource d
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreA case–control study (80 patients with chronic hepatitis B virus [HBV] infection and 96 controls) was performed to evaluate the association of an IL12A gene variant (rs582537 A/C/G) with HBV infection. Allele G showed a signifcantly lower frequency in patients compared to controls (31.2 vs. 46.9%; probability [p]=0.009; corrected p [pc]=0.027) and was associated with a lower risk of HBV infection (odds ratio [OR]=0.49; 95% confdence interval [CI]=0.29–0.83). A similar lower risk was associated with genotypes CG (17.5 vs. 29.2; OR=0.25; 95% CI=0.08–0.81; p=0.02) and GG (10.0 vs. 16.7; OR=0.25; 95% CI=0.07–0.91; p=0.036), but the pc value was not signifcant (0.12 and 0.126, respec‑ tively). Serum IL35 levels showed signifcant difere
... Show More