Electricity consumption for household purposes in urban areas widely affects the general urban consumption compared to other commercial and industrial uses, as household electricity consumption is affected by many factors related to the physical aspects of the residential area such as temperature, housing unit area, and coverage ratio, as well as social and economic factors such as family size and income, to reach the extent of the influence of each of the above factors on the amount of electricity consumed for residential uses, a selected sample of a residential area in the city of Baghdad was studied and a field survey conducted of the characteristics of that sample and the results analyzed and modeled statistically in relation to the amount of electricity consumed for residential units. Results showed that the annual electricity consumption is directly proportional to both the increase in the residential plot area and the increase in the number of residents of the housing unit and the increase in the monthly income of households, while it is inversely proportional to the plot coverage rate. Through the results of the field research, it was possible to build six quantitative models describing the behavior of electricity consumption in relation to the variables covered in the research.
Through this research, We have tried to evaluate the health programs and their effectiveness in improving the health situation through a study of the health institutions reality in Baghdad to identify the main reasons that affect the increase in maternal mortality by using two regression models, "Poisson's Regression Model" and "Hierarchical Poisson's Regression Model". And the study of that indicator (deaths) was through a comparison between the estimation methods of the used models. The "Maximum Likelihood" method was used to estimate the "Poisson's Regression Model"; whereas the "Full Maximum Likelihood" method were used for the "Hierarchical Poisson's Regression Model
... Show MoreAbstract
The current study presents numerical investigation of the fluid (air) flow characteristics and convection heat transfer around different corrugated surfaces geometry in the low Reynolds number region (Re<1000). The geometries are included wavy, triangle, and rectangular. The effect of different geometry parameters such as aspect ratio and number of cycles per unit length on flow field characteristics and heat transfer was estimated and compared with each other. The computerized fluid dynamics package (ANSYS 14) is used to simulate the flow field and heat transfer, solve the governing equations, and extract the results. It is found that the turbulence intensity for rectangular extended surface was larg
... Show MoreBackground: It has been well known that the success of mandibular implant- retained overdenture heavily depends on initial stability, retention and long term osseointegration this is might be due to optimal stresses distribution in surrounding bones. Types of mandibular implant- retained overdenture anchorage system and number of dental implants play an important role in stresses distribution at the implant-bone interface. It is necessary to keep the stresses below the physiologic tolerance level of the bone .since. And it is difficult to measure these stresses around bone in vivo. In the present study, finite element analysis used to study the stresses distribution around dental implant supporting Mandible implant retained overdenture Mate
... Show MoreBackground: Maxillary first premolar with wide MOD cavity more susceptible to fracture. The aim of this study was to assess the influence of cavity design for cusp coverage on the fracture resistance of weakened maxillary first premolar restored with CAD/CAM hybrid ceramic versus nanohybide composite. Materials and Methods: Fifty six intact maxillary first premolars of approximately comparable sizes were divided into seven groups eight for each: Group A: Intact teeth (control group); Group B: teeth prepared for MOD inlay; Group C: teeth prepared for MOD onlay covering the lingual cusp; Group D: teeth prepared for MOD covering buccal and lingual cusps ,the previous three groups indirectly restored with nanohybrid composite (3M ESPE Z 250 X
... Show MoreInternational satellite channels in Arabic are targeted to the region with their news bulletins and their innovative programs, attracting the interest of the Arab viewers in their news articles and programs with new ideas and methods as well as high technology in the production and synthesis of videos. Therefore, they work on framing the above, And the media policy that governs, so focused the problem of the study to try to answer the question of the President is how to frame the international satellite channels in Arabic to the phenomenon of terrorism? What are the aspects that are working to highlight and aspects that try to hide? The study adopted the survey methodology for the main news bulletins in the Russian channel today for the
... Show MoreAchieve breastfeeding book and theft book
To the end of the door cut the way of the manuscript
Sailing Forum for Sheikh Ibrahim bin Mohammed Halabi
(T: 659 H)
Teresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the