We consider the outflow of water from the peak of a triangular ridge into a channel of finite depth. Solutions are computed for different flow rates and bottom angles. A numerical method is used to compute the flow from the source for small values of flow rate and it is found that there is a maximum flow rate beyond which steady solutions do not seem to exist. Limiting flows are computed for each geometrical configuration. One application of this work is as a model of saline water being returned to the ocean after desalination. References Craya, A. ''Theoretical research on the flow of nonhomogeneous fluids''. La Houille Blanche, (1):22–55, 1949. doi:10.1051/lhb/1949017 Dun, C. R. and Hocking, G. C. ''Withdrawal of fluid through a line sink beneath a free surface above a sloping boundary''. J. Eng. Math. 29:1–10, 1995. doi:10.1007/bf00046379 Hocking, G. ''Cusp-like free-surface flows due to a submerged source or sink in the presence of a flat or sloping bottom''. ANZIAM J. 26:470–486, 1985. doi:10.1017/s0334270000004665 Hocking, G. C. and Forbes, L. K. ''Subcritical free-surface flow caused by a line source in a fluid of finite depth''. J. Eng. Math. 26:455-466, 1992. doi:10.1007/bf00042763 Hocking, G. C. ''Supercritical withdrawal from a two-layer fluid through a line sink", J. Fluid Mech. 297:37–47, 1995. doi:10.1017/s0022112095002990 Hocking, G. C., Nguyen, H. H. N., Forbes, L. K. and Stokes,T. E. ''The effect of surface tension on free surface flow induced by a point sink''. ANZIAM J., 57:417–428, 2016. doi:10.1017/S1446181116000018 Landrini, M. and Tyvand, P. A. ''Generation of water waves and bores by impulsive bottom flux'', J. Eng. Math. 39(1–4):131-170, 2001. doi:10.1023/A:1004857624937 Lustri, C. J., McCue, S. W. and Chapman, S. J. ''Exponential asymptotics of free surface flow due to a line source''. IMA J. Appl. Math., 78(4):697–713, 2013. doi:10.1093/imamat/hxt016 Stokes, T. E., Hocking, G. C. and Forbes, L.K. ''Unsteady free surface flow induced by a line sink in a fluid of finite depth'', Comp. Fluids, 37(3):236–249, 2008. doi:10.1016/j.compfluid.2007.06.002 Tuck, E. O. and Vanden-Broeck, J.-M. ''A cusp-like free-surface flow due to a submerged source or sink''. ANZIAM J. 25:443–450, 1984. doi:10.1017/s0334270000004197 Vanden-Broeck, J.-M., Schwartz, L. W. and Tuck, E. O. ''Divergent low-Froude-number series expansion of nonlinear free-surface flow problems". Proc. Roy. Soc. A., 361(1705):207–224, 1978. doi:10.1098/rspa.1978.0099 Vanden-Broeck, J.-M. and Keller, J. B. ''Free surface flow due to a sink'', J. Fluid Mech, 175:109–117, 1987. doi:10.1017/s0022112087000314 Yih, C.-S. Stratified flows. Academic Press, New York, 1980. doi:10.1016/B978-0-12-771050-1.X5001-3
This review is concluded of 8-Hydroxyquinline (8HQ) compound and derivatives which has a very significant interests with a strong fluorescence , furthermore the relationship between divalent metal ions and characteristic of chelating . In the same way coordinated features have increase of its organic action and inorganic behavior by giving many samples of compounds which are a good chelating agents ligands with more capable of forming very stable complexes.Therefore, the role of (8HQ) is not limited on complexes only but its applications in different fields so this review will focus on demonstration preparation methods and properties of (8HQ) derivatives with their complexes and applications, hopefully that we will cover a part of scientifi
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThe development of low profile gamma-ray detectors has encouraged the production of small field of view (SFOV) hand-held imaging devices for use at the patient bedside and in operating theatres. Early development of these SFOV cameras was focussed on a single modality—gamma ray imaging. Recently, a hybrid system—gamma plus optical imaging—has been developed. This combination of optical and gamma cameras enables high spatial resolution multi-modal imaging, giving a superimposed scintigraphic and optical image. Hybrid imaging offers new possibilities for assisting clinicians and surgeons in localising the site of uptake in procedures such as sentinel node detection. The hybrid camera concept can be extended to a multimodal detec
... Show MoreMaximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MorePolymethylmethacrylate film (PMMA) of thickness 75 μm was evaluated Spectrophotometrically for using it as a low-doses gamma radiation dosimeter. The doses were examined in the range 0.1 mrad-10 krad. Within an absorption band of 200-400 nm, the irradiated films showed an increase in the absorption intensity with increasing the absorbed doses. Calibration curves for the changes in the absorption differences were obtained at 218, 301, and 343 nm. At 218 nm the response for the absorbed doses is a linear in the range 10 mrad- 10 krad. Hence it is recommended to be adopted as an environmental low doses dosimeter
This research investigates new glasses which are best suitable for design of optical systems
working in the infrared region between 1.01 to 2.3μm. This work is extended to Oliva & Gennari
(1995,1998) research in which they found that the best known achromatic pairs are (BAF2-IRG2; SRF2-
IRG3; BAF2-IRG7; CAF2-IRGN6; BAF2-SF56A and BAF2-SF6). Schott will most probably stop the
production of these very little used and commercially uninteresting IRG glasses. In this work equally
good performances can be obtained by coupling BAF2, SRF2&CAF2 with standard glasses from Schott
or Ohara Company. The best new achromatic pairs found are (SRF2-S-TIH10; CAF2-S-LAL9; CAF2-SLAL13
and CAF2-S-BAH27). These new achromatic pai
In this research, we introduce and study the concept of fibrewise bitopological spaces. We generalize some fundamental results from fibrewise topology into fibrewise bitopological space. We also introduce the concepts of fibrewise closed bitopological spaces,(resp., open, locally sliceable and locally sectionable). We state and prove several propositions concerning with these concepts. On the other hand, we extend separation axioms of ordinary bitopology into fibrewise setting. The separation axioms we extend are called fibrewise pairwise T_0 spaces, fibrewise pairwise T_1 spaces, fibrewise pairwise R_0 spaces, fibrewise pairwise Hausdorff spaces, fibrewise pairwise functionally Hausdorff spaces, fibrewise pairwise regular spaces, fibrewise
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas
... Show More