The aim of this study is to investigate the response of the Ionospheric E- region critical frequency foE and virtual height h’E parameters to the solar cycle 22 over Baghdad city (latitude 33.3˚N, longitude 44.4˚E). Both parameters display a high relationship with the sunspot relative number within the ascending and descending phases of the solar cycle. The E - region response to the solar activity is obvious around noon, sunrise and sunset times. Moreover, the gap between local mid-afternoon, dawn and sunset values expands as solar activity rises. In the declining phase, there is an aspect that results in a peak of disturbance. This portion may have linked to coronal holes and resulted in high disturbance peak during 1992-1994. The impact of this portion is obvious in raising the values of foE, especially in 1993.
This study deals with the subject of art criticism by using Erwin Panofsky's theory to analyze a few Saudi artists' works. The study aims to identify Panofsky's theory and provide criticism of some Saudi artworks using it. The importance of the study is that it enriches the field of art criticism in the Kingdom of Saudi Arabia and helps critics and artists in using Panofsky’s theory to analyze artworks.
The study sample consists of six artworks produced in 2021 by six contemporary Saudi artists. In the theoretical section, the study dealt with several topics; first, is art criticism, the second part presents Panofsky’s theory with its three stages, the final part deals with the beginning of Saudi art until present time and its
This paper deals with the ideological positioning of the English poet John Donne in a selected poems of his i.e Holy Sonnet X, as regards the theme of death found therein. The researchers adopt an emerging branch of stylistics, called Critical Stylistics, as proposed by Jeffries (2010) in order to uncover the ideologies of the author regarding the topic concerned and how linguistic choices are used to slant ideas. The model is comprised of ten tools of analysis which, upon being applied to the selected data, have shown how the poet exploits language resources in order to pass his ideology and influence his readers. In this paper, the workings of only one tool are presented as applied to a certain portion of the data.
From 50 stool samples collected from children with diarrhea of both sexes who visited various hospitals in Baghdad, 26 isolates of E.coli were found to belong to the phylogenetic group E. The findings revealed that the percentage of E.coli for thephylogenetic group E is (52%) , making it the dominant group among the other phylogenetic groups. The findings demonstrated that 100% of the E.coli isolates from phylogenetic group E are resistant to penicillin, and only 15% are resistant to imipenem. Multi-drug resistance (MDR) was found to be 15%, while XDR reached 85%. The results of thephylogenetic group for the remaining species of isolates in this study were group A (2/50 and by 4%), gr
... Show MoreThe accounting system of government is considered an important tool to follow up the financial transactions that reflect the activities of governmental units and by which the useful information for estimating governmental annual revenues and expenditures are provided through the state public budget because it is an information system that provides detailed past performance, as well as measures the efficiency of the governmental agencies performance in implementing the budget, and the of success governmental units is measured through the type of services and programs offered, their size and the possibility of achieving the objectives assigned to them. The medical evacuation program is one of the medical and curative health services provid
... Show MoreThis paper shows the characteristics of temperature and adsorbed (water vapor) mass rate distribution in the adsorber unit which is the key part to any adsorption refrigeration system. The temperature profiles of adsorption/desorption phases (Dynamic Sorption) are measured experimentally under the operating conditions of 90oC hot water temperature, 30oC cooling water temperature, 35oC adsorption temperature and cycle time of 40 min. Based on the temperature profiles, The mass transfer equations for the annulus adsorbent bed are solved to obtain the distribution of adsorption velocity and adsorbate concentration using non-equilibrium
model. The relation between the adsorption velocity with time is investigated during the process of ads
E-learning is a necessity imposed by the Corona pandemic, which has disrupted various educational institutions in the world, but some of these institutions have not been affected and education has continued with them, due to their flexible educational system that was able to employ technology in the continuity of the educational process in the so-called e-learning, because It has characteristics that make it the most suitable alternative to avoid the consequences of the Corona pandemic and its damage to the educational process, as e-learning is one of the modern methods that contribute to enhancing the effectiveness of the learner, and enabling him to assume greater responsibility compared to traditional education, so the learner becomes
... Show MoreRainfall in the mid-latitudes is highly related to the synoptic pattern at the upper-levels, this study focuses on the relationship between 500 hPa geopotential height patterns and the cyclone at the surface. Synoptic studies that there is a correlation between cyclone at the surface and deepening of the trough at the upper in the mid-latitudes. The results show that when the upper trough is situated over the eastern Mediterranean, this will enhance the advection of warm and moist air from the tropical region, which will cause baroclinic instability over Iraq, leading to heavy precipitation and torrents in some situations.
Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher B
... Show MoreSelf-Assertion is the individual ability to express any emotion well, except the anxiety. The decrease of the individuals asserting behavior makes them face many difficulties that prevent their social adjustment. Moreover it reflexes many negative behavioral and physical cases. The individual, who fails to express his or her negative feelings in required situations, feels with dissatisfaction, loneliness, depression, anxiety, social anxiety, conflict, and psychological disorder.
Accordingly, the importance of this study is represented in studying the self-assertion and studying the university students who reflect the strength of society.
The following are the two aims of the study:
1. Construct an asserting behavior scale.
2.