Two‐dimensional buoyancy‐induced flow and heat transfer inside a square enclosure partially occupied by copper metallic foam subjected to a symmetric side cooling and constant heat flux bottom heating was tested numerically. Finite Element Method was employed to solve the governing partial differential equations of the flow field and the Local Thermal Equilibrium model was used for the energy equation. The system boundaries were defined as lower heated wall by constant heat flux, cooled lateral walls, and insulated top wall. The three parameters elected to conduct the study are heater length (7 ≤
The present study aims at identifying the styles, procedures of Iraqi universities to avoid plagiarism and evaluate these steps, also to evaluate the form prepared by the Directory of Scientific Supervision and Evaluation, Ministry of Higher Education and Scientific Research. The study uses documentary style, 150 teachers in the following colleges (Education Ibn Rushd, Languages and Arts) in university of Baghdad whom already used the aforementioned list were the sample of the study and they asked to give their opinions about the list.The study consists of five sections, first one deals with general view, second explains plagiarism and its types, shapes and reasons,third tackles with ways of detecting plagiarism, its programs, consequences
... Show MoreChristianity rejected abortion, since its inception, it took a luck against abortion, although there is no mention of it in the Bible, as there is no explicit text for abortion in the Old or New Testament and that the early Christians considered abortion a sin in all stages, and beliefs included abortion as an act of murder. What is forbidden in the Ten Commandments is “Thou shalt not kill”, and it is understood that killing here is either plundering one’s personal life (suicide) or stealing another person’s life (killing), or stealing the life of a person who has not yet been born (aborting fetuses). Based on the above, it was necessary for individuals to search for (Abortion in the Christian Religion / Descriptive Study) The resea
... Show MoreBackground: Fractures of the humeral shaft accounting for approximately 3% of all fractures. There is a wide array of good options for their treatment and controversy over the best methods. Although good techniques of osteosynthesis are available, the aim of this article is toemphasize on the benefit and good outcome of conservative treatment for properly selected cases to decrease the cost and avoid the complications of surgery. Method : During the period from February 2011 to June 2012 fifty-five fractures of humeral shaft were treated at orthopedicdepartment in the ALKindyteaching hospital. 22 fractures considered suitable for the study. The patients treatedconservatively by using the‘U’ shaped coaptation slab. Then we shift to POP c
... Show MoreAbstract Background Infections with helminths are associated with deficient sanitary facilities, unsafe human waste disposal, inadequate and lack of safe drinking water, and low socioeconomic status. Objective To determine the prevalence of some gastrointestinal helminths among Iraqi people, and association of infections with age, sex, and region in Iraq. Method This study is retrospective, including reported cases of infections using an available surveillance database from January 2013 to December 2013 of all provinces of Iraq by the Ministry of Health. Result The overall prevalence of gastrointestinal helminthiasis was 1.39%. Enterobius vermicularis found to be the predominant helminth parasite. No significant (P < 0.05) rel
... Show MoreStream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha
... Show MoreThe study aimed to identify the self- compassion of the students as well as to identify the differences in the self- compassion according to the variables: sex - the academic specialization - Study level, the sample of the study of (200) students distributed equally by sex (male - female) Specialization (Scientific - Human) compassion. The results showed that there were no differences in the self- compassion according to the variables: gender, academic specialization, and Study level. In light of these results, the researcher Number of the recommendations and proposals