Seepage occurs under or inside structures or in the place, where they come into contact with the sides under the influence of pressure caused by the difference in water level in the structure U / S and D / S. This paper is designed to model seepage analysis for Kongele (an earth dam) due to its importance in providing water for agricultural projects and supporting Tourism sector. For this purpose, analysis was carried out to study seepage through the dam under various conditions. Using the finite element method by computer program (Geo-Studio) the dam was analysed in its actual design using the SEEP / W 2018 program. Several analyses were performed to study the seepage across Kongele dam in several cases, including when the reservoir was empty, and at the normal and maximum water level. The final results of the analysis show that the dam is safe.
ABSTRACT Backgrounds: Maxillary canine impaction is complicated and time consuming to treat, for being highly diverse in inclination and location; it may be a companied by root resorption of the neighboring teeth. CBCT has been used for its' diagnostic reliability in localization of impacted canine and revealing its' serious local complications. Objectives: Localization of maxillary impacted canine using cone beam computed tomography for assessment of angulation, distance from occlusal plane, alveolar width and proximity to adjacent teeth. Subjects and Methods: The study sample was 33 subjects 16 females and 17 males attended to Al-Wasitti general hospital in Baghdad city-Oral and maxillofacial radiology department for CBCT scan investigati
... Show MoreThis study focused on a fundamental issue which was represented by ability of Iraqi central bank in facing the difficulty of determining the optimal ratio of liquidity in the Iraqi banks in terms of the balancing between its obligations to the depositors and borrowers, and liquidate their funds on one hand and the risks on the other hand.the search aimed for achieving the goals which represented by identifying the possibility of Iraqi banks to apply the regulations rules and instructions issued by central bank of Iraq in determining ratio of liquidity and its appropriate with Iraqi banks action to implement a reasonable profit to&
... Show More
The research aims to identify the magnitude of the impact of external debt on the gross domestic product in Morocco, and the importance of research lies in the role that external debt plays in addressing structural imbalances, if it is best disposed of according to well-studied economic plans by specialists in this regard, especially if these debts are directed with Other resources, as it helps pay the costs of these debts (debt servicing) that the external debt also raises the level of gross domestic product, and the research starts from the hypothesis that: There is an effect of foreign debt on the GDP in Morocco, has contributed in one way or another to The exacerbation of the external debt, which affected the m
... Show MoreMultilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated d
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreManipulation is a discursive concept which plays a key role in political discourse by which politicians can impose some impact on their recipients through using linguistic features, most prominent of which are personal pronouns (Van Dijk, 1995). The aim of this study is to investigate how politicians utilize the personal pronouns, namely; We and I and their possessive forms as a tool of manipulating the audience's mind based on Van Dijk's "ideological square" which shows positive-self representation and negative-other representation (Van Dijk,1998:p.69). To this end, American President Donald Trump's 2020 State of the Union speech was chosen to be the data of analysis. Only (8)
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreNew series of metal ions complexes have been prepared from the new ligand 1,5- Dimethyl-4- (5-oxohexan-2- ylideneamino) -2-phenyl- 1H-pyrazol-3 (2H)-one derived from 2,5-hexandione and 4-aminophenazone. Then, its V(IV), Ni(II), Cu(II), Pd(II), Re(V) and Pt(IV) complexes prepared. The compounds have been characterized by FT-IR, UV-Vis, mass and 1H and 13C-NMR spectra, TGA curve, magnetic moment, elemental microanalyses (C.H.N.O.), chloride containing, Atomic absorption and molar conductance. Hyper Chem-8 program has been used to predict structural geometries of compounds in gas phase, the heat of formation, (binding, total and electronic energy) and dipole moment at 298 K.
This study explores the barriers to adopting green environmental criteria in Supplier Selection (SS) within the Iraqi food industry. It aims to enhance the understanding of sustainable supply chain management in developing nations, with a particular focus on the Iraqi context. A case study approach was utilized to identify eleven key green environmental criteria and 54 sub-criteria, alongside seven major barriers to their adoption. The Best–Worst Method (BWM) was employed to rank the criteria, and Fuzzy Stepwise Weight Assessment Ratio Analysis (SWARA) was used to prioritize the barriers. The analysis revealed that Environmental Management Systems are the most critical criterion for SS. On the other hand, legislation and policies emerged
... Show More