نتایج جستجو برای: hydrostatic suction created by water entry and exit control

تعداد نتایج: 18031256  

ژورنال: علوم آب و خاک 2017
الباجی, محمد, ناصری, عبدعلی, گلابی, منا,

In the present study Hydrus-1D software was used to simulate electrical conductivity, pH and sodium, potassium, calcium, magnesium, chloride and sulfate ions. Field experiments were performed at the Sugarcane Research Center located in south of Ahvaz on sugarcane varieties CP48-103 with four water treatments (one treatment was Karun river water and three treatments were diluted drainage water) ...

Journal: :Journal of Business Venturing 2014

2009
Xianchang Li Ting Wang Benjamin Day

Ejectors have been widely used in many applications such as water desalination, steam turbine power generation, refrigeration systems, and chemical plants. The advantage of an ejector system lies in its extremely reliable and stable operation due to the complete absence of moving parts. However, the performance depends on a number of factors, among which the flow channel configuration/arrangeme...

Alibakhshi R Azadbakht M Bashiri Z, Mirahadi N

Background: The advances in cytogenetic techniques during the last few years have permitted not only the study of large populations of wild and domestic animals, but also the detection of chromosome anomalies in embryos. Chromosomal abnormalities are the most common cause of embryonic and fetal mortality in mammals. Most reports of chromosome anomalies in parthenogenetic embryos describe numeri...

Journal: :Communicative & integrative biology 2011
Jeffrey M Aristoff Roman Stocker Pedro M Reis Sunghwan Jung

We consider two biological phenomena taking place at the air-water interface: the water lapping of felines and the water running of lizards. Although seemingly disparate motions, we show that they are intimately linked by their underlying hydrodynamics and belong to a broader class of processes called Froude mechanisms. We describe how both felines and lizards exploit inertia to defeat gravity,...

Journal: :Frontiers of Structural and Civil Engineering 2022

Abstract The Richards’ equation describes the flow phenomenon in unsaturated porous media and is essential to hydrology environmental science. This study evaluated numerical stability of two different forms equation. Sensitivity analyses were performed investigate control parameters results show that h -form has better applicability for calculating variable saturation flows than θ For equation,...

Journal: :E3S web of conferences 2023

Most of the infrastructure investments and earthworks not requiring deep foundations are usually designed in vadose zone to avoid excessive groundwater-structure interactions. The mechanical behaviour soil material, under partially saturated conditions, is greatly influenced by pore-water tension, known as suction, characteristics Soil Water Retention Curve (SWRC). In present paper, SWRC a silt...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1389

abstract: sayyed mohammad tabatabaee is accounted as one of the effective persons in iran contemporaneoushistory and his role in the events of iran constitution revolution is inevitable. sayyed mohammad tabatabaee from the time of naser al din shah qajar and arrival to iran, informed of the advantages and the basis of constitution, was in the thought of making the iran rule as a constituti...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

abstract the current study set out to address the issue as to whether the implementation of portfolio assessment would give rise to iranian pre-intermediate efl learner autonomy. participants comprised 60 female in pre-intermediate level within the age range of 16-28.they were selected from among 90 language learners based on their scores on language proficiency test -key english test. then, t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید