Recent developments in two main phases of cumulus cloud studies are discussed; first the relations between the clouds and their energy sources in the subcloud layer and second, the interaction between the clouds and their environment in the cloud layer. Under the first heading, the various originating impulses for cumulus formation are mentionitd. and how the character of this impulse affects the spacing, scale and temperature structure of the clouds. The possible origins of trade cumuli are considered.
The study aims to identify the symptoms of PTSD among displaced Yazidi women according to age, marital status, educational level, and type of status (displaced or survivor). The study also seeks to identify the effect of the relaxation program on reducing PTSD among displaced Yazidi women. The research sample included (60) Yazidis for the statistical analysis sample and (5) for the experimental sample in the Dohuk governorate. For achieving the research objectives, a scale was used from the PTSD Checklist for DSM-5 (PCL-5), as well as a relaxation program was prepared. The researchers reached the following results that there is an average level of PTSD symptoms among displaced Yazidi women, there are no statistically significant differen
... Show MoreOyster mushroom (Pleurotus ostreatus (Jacq. ex Fr.) P. Kumm.) is involved in the destruction of dead wood which is the main place of settlement of several living organisms. After humification, dead wood also becomes an important component of forest soils.
The purpose of the research is to study temperature and moisture conditions of extensive cultivation of oyster mushrooms on various wood substrates. To accomplish this goal, the following tasks were set: to determine the amount of effective stress temperatures and moisture content of substrates and their influence on the appearance of fruiting bodies of the oyster mushroom; to study the features of the extensive culti
... Show MoreIn recent years, there has been growing interest in using Nanosystems in different biomedical applications. Among all metal nanoparticles, selenium nanoparticles have attracted the attention of many researchers due to its low toxicity and nutritional supplementation value. The purpose of the current study was designed to examine the possible effect of selenium nanoparticles in combination with fenugreek leaves extract (an edible herb with good medicinal properties) in the treatment of oxidative stress status-related to polycystic ovary syndrome in letrozole-induced PCOS (an imbalance of reproductive hormones that causes infertility) in adult female rats. Cold plasma was used in the preparation of selenium nanoparticles subsequently the prod
... Show MoreThe present work aimed to investigate the neuraminidase (nan1) gene expression in 32 different clinical isolates of Pseudomonas aeruginosa to explore the role of the enzyme in different types of infection and might give a better understanding of host cell-pathogens interaction. In addition, the effect of monosaccharide D-mannose on neuraminidase gene expression in eight isolates was studied by utilizing a reverse transcription-quantitative polymerase chain reaction (RT-qPCR). The results demonstrated that the highest expression of nan1 gene was in otitis samples (208,913.81) which were significantly higher than that from other infections (P < 0.01). While, the concentrations of gene copies obtained from urin
... Show MoreThis work investigates the effect of the gas nitriding process on the surface layer microstructure and mechanical properties for steel 37, tool steel X155CrVMo12-1 and stainless steel 316L. Nitriding was conducted at a temperature of 550 °C for 2 hours during the first stage and at 750 °C for 4 hours during the second stage. SEM and X-ray diffraction tests were performed to evaluate the microstructural features and the major phases formed after surface treatment. SEM and X-ray diffraction tests were performed to assess the microstructural features and the primary phases formed after surface treatment. The new secondary precipitates were identified as γ′-Fe4N, ε (Fe2–3N), and α-Fe, exhibiting an uneven chain-like pattern wit
... Show MoreA novel demountable shear connector for precast steel-concrete composite bridges is presented. The connector uses high-strength steel bolts, which are fastened to the top flange of the steel beam with the aid of a special locking nut configuration that prevents bolts from slipping within their holes. Moreover, the connector promotes accelerated construction and overcomes the typical construction tolerance issues of precast structures. Most importantly, the connector allows bridge disassembly. Therefore, it can address different bridge deterioration scenarios with minimum disturbance to traffic flow including the following: (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (
... Show MoreMaximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More