Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all rivers will have serious repercussions, affecting the agricultural and industrial production, food security, particularly Egypt as it exploits (85%) of the river water for agricultural purposes, and thus water share to be below the required threshold, so unlike all the other Nile basin countries that have many other sources so is the subject of the Nile water for Egypt is a national security issue in the absence of a comprehensive agreement includes all the riparian states of the Nile River, especially with the presence of external forces (such as the US and Israel) are trying to provoke differences in order to become a party to take advantage of the territorial waters and international, which will cause adverse effects (current and future) to downstream (Egypt and Sudan), represented by (water deficit grave) will happen by filling the tank with water period, and after the collapse of the dam being built on an extremely rugged slope on the plateau, the prospects for its collapse is very high.
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
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
This paper investigates the issue of surface-type effects on traffic noise in Baghdad. Since the raw materials for both flexible and rigid paving are available from local sources, the decision on selecting the type of paving which depends on the budget of the project and the road's importance and function. Knowing that for high traffic volumes and a high percentage of heavy vehicles, rigid pavement is more suitable compared to flexible pavement. In Baghdad, some highways consist of flexible pavement and others of combined pavement (flexible segments and rigid segments), so the study of the effect of surface type on traffic noise becomes an important matter. This study selected three highways: one with flexible pavement and two with combined
... Show MoreFive species of Trogoderma Berthold are reported from Iraq. These are: I inclus,n LeCont. T.
granarium Everts, T. variable Ballion. I. bactrianum Zantiev and T. irroraturn Reitter. A key
to the species is presented, with redeseriptions and illustrations of all species.
The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.
FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic
... Show MoreGivers of foreign Audit about Social Responsibility of Profit Organization. The recent time is charcterstically with big economic Organization activities, because there are many transactions between these Organizations and different financial markets development techniques.
This encourgage business men to increase their efforts for investment in these markets. Because the Accounting is in general terms it represents a language of these Unions Activities and translate them in to fact numbers, for that there is need for Accounting recording for certain of these Organizations behavior and their harmonization with their Objectives.
In this respect the Audit function comes to che
... Show MoreRacism is a serious issue that impacts a lot of people around the world. Since slavery days, racial discrimination has been increasing to abhorrent levels in relation to black people. The aim of individual psychology by Alfred Adler is to study human behaviour by situating it in the social context which makes his writing ideal to explanation of racism. This paper aims to study racism in Roy Williams’ Fallout from the perspective of Alfred Adler’s theory. Alfred Adler's individual psychology emphasizes the importance of social factors in shaping individual behavior, including the ways in which individuals form their sense of self and identity. This makes it a valuable framework for understanding the complex social and psychological facto
... Show MoreAging of asphalt pavements typically occurs through oxidation of the asphalt and evaporation of the lighter maltenes from the binder. The main objective of this study is to evaluate influence of aging on performance of asphalt paving materials.nAsphalt concrete mixtures, were prepared, and subjected to short term aging (STA) procedure which involved heating the loose mixtures in an oven for two aging period of (4 and 8) hours at a temperature of 135 o C. Then it was subject to Long term aging (LTA) procedure using (2 and 5) days aging periods at 85 o C for Marshall compacted specimens. The effect of aging periods on properties of asphalt concrete at optimum asphalt content such as Marshall Properties, indirect tensile strength at 25 o C,
... Show MoreIntroduction: Syphilis is a sexually transmitted disease, that may be transferred from mothers to infants during pregnancy if it is left untreated. Method: This study was conducted among 65 women who suffered from recurrent abortions in Iraq. Syphilis screening recombinant (IgM + IgG) level by ELISA, RADIM (Italy) and rapid plasma reagin (RPR) (positive and negative results) tests were used to analyse the data. Results: A non-significant association was observed with age (p=0.989), and the number of healthy births (p=0.643). Non-significant differences were observed in comparisons between smoker and non-smoker percentages in the study group. The rapid test for syphilis confirmation was applied using Rapid Plasma Reagin (RPR) tests.
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More