The theory of Topological Space Fiber is a new and essential branch of mathematics, less than three decades old, which is created in forced topologies. It was a very useful tool and played a central role in the theory of symmetry. Furthermore, interdependence is one of the main things considered in topology fiber theory. In this regard, we present the concept of topological spaces α associated with them and study the most important results.
تسعى تركيا ضمن سياساتها المائية ومنذ زمن بعيد وبأصرار على تنفيذ المزيد من بناء السدود والمشاريع التخزينية المائية على حوضي دجلة والفرات، الامر الذي يؤدي بالضرورة الى تناقص معدل الواردات المائية لنهري دجلة والفرات الداخلة للاراضي العراقية .وبالتالي التأثير على مقومات التنمية الزراعية العربية بشكل عام والتنمية الزراعية بالعراق بشكل خاص ومن ثم تهديد الامن الغذائي الوطني.
لذا فأن البحث يهد
... Show MoreAfter the political change in Iraq in 2003, Iraq witnessed a stage of social and political development and the strengthening of the legal foundations of the state system, by the approval of the permanent Iraqi constitution of 2005, and stipulating the quota system.
Iraqi women participated in the parliamentary elections from 2005 until 2021, and despite the participation of Iraqi women in all elections, there are challenges that women in Iraq face that prevent their political participation in general and participation in parliament in particular. There are factors behind this, including those related to Iraqi women themselves, including those concerning the political institution and factors related to the nature of society, and it
... Show MoreThe downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates
... Show MoreThe study presents the test results of Completely Decomposed Granite (CDG) soil tested under drained triaxial compression, direct shear and simple shear tests. Special attention was focused on the modification of the upper halve of conventional Direct Shear Test (DST) to behave as free
head in movement along with vertical strain control during shear stage by using Geotechnical Digital System (GDS). The results show that Free Direct Shear Test (FDST) has clear effect on the measured shear stress and vertical strain during the test. It has been found that shear strength
parameters measured from FDST were closer to those measured from simple shear and drained triaxial compression test. This study also provides an independent check on
This paper studied the behaviour of reinforced reactive powder concrete (RPC) two-way slabs under static load. The experimental program included testing three simply supported slabs of 1000 mm length, 1000 mm width, and 70 mm thickness. Tested specimens were of identical properties except their steel fibers volume ratio (0.5 %, 1 %, and 1.5 %). Static test results revealed that, increasing steel fibers volume ratio from 0.5% to 1% and from 1% to 1.5%, led to an increase in: first crack load by (32.2 % and 52.3 %), ultimate load by (36.1 % and 17.0 %), ultimate deflection by (33.6 % and 3.4 %), absorbed energy by (128 % and 20.2 %), and the ultimate strain by (1.1 % and 6.73 %). The stiffness and ductility of the specimens also increased. A
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreAn optoelectronic flow-through detector for active ingredients determination in pharmaceutical formulations is explained. Two consecutive compact photodetector’s devices operating according to light-emitting diodes-solar cells concept where the LEDs acting as a light source and solar cells for measuring the attenuated light of the incident light at 180˚ have been developed. The turbidimetric detector, fabricated of ten light-emitting diodes and five solar cells only, integrated with a glass flow cell has been easily adapted in flow injection analysis manifold system. For active ingredients determination, the developed detector was successfully utilized for the development and validation of an analytical method for warfarin determination
... Show MoreA model using the artificial neural networks and genetic algorithm technique is developed for obtaining optimum dimensions of the foundation length and protections of small hydraulic structures. The procedure involves optimizing an objective function comprising a weighted summation of the state variables. The decision variables considered in the optimization are the upstream and downstream cutoffs lengths and their angles of inclination, the foundation length, and the length of the downstream soil protection. These were obtained for a given maximum difference in head, depth of impervious layer and degree of anisotropy. The optimization carried out is subjected to constraints that ensure a safe structure aga
... Show MoreFirst: People’s need for advocacy:
Calling for a legal necessity for all people, regardless of their races, colours, tongues, and culture, to explain the truth, spread fear, bring benefits, ward off evil, regulate a person’s relationship with his Lord, and his relationship with creatures, so that he knows his money and what he owes.
All of creation is in dire need of the call to God’s religion with insight due to their inability to reach out to goodness, righteousness, guidance, and success on their own. Man is limited in thinking in this universe, limited in his resolve, unable to know what will improve his affairs in the two worlds. His need for religion is one of the necessities of his life, and one of the comple
... Show MoreAbstract
This study aims to identify the reality of using electronic applications in teaching language skills to people with mild intellectual disabilities from the mothers’ perspective. A descriptive approach was used. The electronic questionnaires were administered to the study sample, 122 responses were received from mothers of the students with mild intellectual disability in Hafer Al-Baten schools. The response average rate was 94%. The results showed that there are statistically significant differences that are related to the variant of monthly income as for the barriers to using electronic applications in such schools, whereas there were no differences regarding the variant of monthly income regarding t
... Show More