Fire is one of the most critical risks devastating to human life and property. Therefore, humans make different efforts to deal with fire hazards. Many techniques have been developed to assess fire safety risks. One of these methods is to predict the outbreak of a fire in buildings, and although it is hard to predict when a fire will start, it is critical to do so to safeguard human life and property. This research deals with evaluating the safety risks of the existing building in the city of Samawah/Iraq and determining the appropriateness of these buildings in terms of safety from fire hazards. Twelve parameters are certified based on the National Fire Protection Association (NFPA2016) code. The concept of giving weight to each criterion was adopted to classify the criteria according to their importance and then conduct an on-site examination of these existing buildings to test the selected criteria. The result indicates a possible fire risk in these buildings due to the lack of compliance with fire safety instructions in the approved codes.
This study aims to assess the accuracy of digital elevation model (DEM) created with utilization of handheld Global Positioning System (GPS) and comparing with Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. It is known that the quality of the DEM is affected by both of accuracy of elevation at each pixel (absolute accuracy) and accuracy of presented morphology (relative accuracy). The University of Baghdad, Al Jadriya campus was selected as a study area to create and analysis the resulting DEM. Additionally, Geographic Information System (GIS) was used to visualize, analyses and interpolate GPS track points (elevation data) of the study area. In this
... Show MoreBased on the results of standard penetration tests (SPTs) conducted in Al-Basrah governorate, this research aims to present thematic maps and equations for estimating the bearing capacity of driven piles having several lengths. The work includes drilling 135 boreholes to a depth of 10 m below the existing ground level and three standard penetration tests (SPT) at depths of 1.5, 6, and 9.5 m were conducted in each borehole. MATLAB software and corrected SPT values were used to determine the bearing capacity of driven piles in Al-Basrah. Several-order interpolation polynomials are suggested to estimate the bearing capacity of driven piles, but the first-order polynomial is considered the most straightforward. Furthermore, the root means squar
... Show MoreBackground: Type two diabetic patients have higher risk of cardiovascular and periodontal disease. Furthermore, patients with more severe periodontal disease have higher incidence of cardiovascular disease. This study aimed to assess the association between periodontal health status and the risk of vascular disease in type 2 diabetic patients. Materials and Methods: One hundred type 2 diabetes mellitus patients and fifty apparently healthy males were enrolled in this study. Oral examinations conducted were; plaque Index, calculus index, gingival index, probing pocket depth, and clinical attachment level. For the assessment of vascular risk, arterial stiffness index was used. Results: According to arterial stiffness index, type 2 diabetic p
... Show MoreInterleukin-38 (IL-38), an inflammatory cytokine discovered in recent years, has been implicated in the pathogenesis of systemic lupus erythematosus (SLE). IL-38 is encoded by the
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreIn this paper, we study some cases of a common fixed point theorem for classes of firmly nonexpansive and generalized nonexpansive maps. In addition, we establish that the Picard-Mann iteration is faster than Noor iteration and we used Noor iteration to find the solution of delay differential equation.
This comprehensive review examines the efficacy and safety of tumor necrosis factor-alpha (TNF-α) inhibitors in treating various autoimmune diseases, and focuses on their application in Iraqi patients. Elevated TNF-α levels are linked to autoimmune disorders, leading to the development of anti-TNF-α therapies such as infliximab, etanercept, adalimumab, certolizumab pegol, and golimumab, which have gained FDA approval for conditions like psoriasis, in¬flammatory bowel disease, ankylosing spondylitis, and rheumatoid arthritis. While these therapies demonstrate sig¬nificant therapeutic benefits, including improved quality of life and disease management, they also carry risks, such as increased susceptibility to infections and pote
... Show MoreElectrical Discharge Machining (EDM) is a non-traditional cutting technique for metals removing which is relied upon the basic fact that negligible tool force is produced during the machining process. Also, electrical discharge machining is used in manufacturing very hard materials that are electrically conductive. Regarding the electrical discharge machining procedure, the most significant factor of the cutting parameter is the surface roughness (Ra). Conventional try and error method is time consuming as well as high cost. The purpose of the present research is to develop a mathematical model using response graph modeling (RGM). The impact of various parameters such as (current, pulsation on time and pulsation off time) are studied on
... Show More