Preferred Language
Articles
/
jcoeduw-1349
The Tribal Power in Contemporary Iraq: A Sociological Analysis
...Show More Authors

This is an empirical investigation of the tribal power in Iraq and its consequences on the socio-political system. A theoretical background concerning thestate kinship, tribe and tribal involvement in politics has been displayed with example of tribal power over people within the social context. Socio-anthropological method of data collection has been used, including a semi-structured interview with a sample of 120 correspondents. The outcome revealed that the feeble and corrupted state (government) play a vital role in encouraging the tribe to be dominant. The people of Iraq are clinging to the tribe regardless of whether they believe in it or not. Although they are aware that the tribe is a pre-state organisation and marred shape of civil society, they have no alternative since the weak government is incapable of restoring law and order. The feeble government is the main factor for tribal strength, the socio-political structure that yield from direct intervention of the invaders and divided the community into fractions, subcultures, religious and ethnic groups creates paralysed socio-political system that incapable to activate law and order, the tribe in turn fill the government power vacancy and enforce its own law and order. Unfortunately, the tribe misuse the power because its rules out of date, but after all, the people reluctantly rely on the tribe entity for protection.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Simulation of Sediment Transport in the Upper Reach of Al-Gharraf River
...Show More Authors
Abstract<p>For the past few years, the sediment began to accumulate in Al-Gharraf River which reduces the flow capacity of the River. In the present research, a numerical model was developed using Hec-Ras software, version 5.0.4. to simulate the flow and sediment transport in the upper reach of the river. The hydrological and cross-section data measured by the Ministry of Water Resources, for the reach located between Kut and Hai cities and having a length of 58200 m, was used to perform calibration and verification of the model. Moreover, field sampling of suspended and bed loads was gathered for five months starting from 7/2/2019, and laboratory tests of samples were conducted to be used as in</p> ... Show More
View Publication
Scopus (8)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
The Efficacy of fractional CO2 laser in management of surgical wound scars
...Show More Authors

Background: Atrophic postoperative and traumatic scarring are common cosmetic problems for patients. Combining CO2 laser ablation with a fractional photothermolysis system in a treatment known as ablative fractional resurfacing fulfilling the new demands for a lesser risk of side effects and minimal or no downtime.Objective: To assess the safety and efficacy of ablation fractional CO2 laser treatments for surgical scarring .methods: Twenty one patient ( 14 women, and 7 men ) with various skin types , I to IV , aged 3 to 48 years , presents with 24 scars between June and December 2012 , four patients excluded from study because they are not continued in follow up , the remaining 17 patient completed all 3 treatments & 6 months follow

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Study the Application of Ultrasonic Technology for Phenol Removal in Petroleum Industry
...Show More Authors

In this study, the sonochemical degradation of phenol in water was investigated using two types of ultrasonic wave generators; 20 kHz ultrasonic processor and 40 kHz ultrasonic cleaner bath. Mineralization rates were determined as a function of phenol concentration, contact time, pH, power density, and type of ultrasonic generator. Results revealed that sonochemical degradation of the phenol conversion was enhanced at increased applied power densities and acidic conditions. At 10 mg/L initial concentration of phenol, pH 7, and applied power density of 3000 W/L, the maximum removal efficiency of phenol was 93% using ultrasonic processor at 2h contact time. Whereby, it was 87% using and ultrasonic cleaner bath at 16h contact time and 150 W

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Prensa Medica Argentina
The effect of niclosamide in acetic-acid induce colitis: An experimental study
...Show More Authors

Scopus (25)
Scopus
Publication Date
Fri Jul 01 2011
Journal Name
Journal Of Craniofacial Surgery
Management of Retained Foreign Bodies in Missile Injuries of the Maxillofacial Region
...Show More Authors

This study evaluates 22 patients with retained foreign bodies in the maxillofacial region that were all caused by penetrating missile injuries. Surgical intervention for the retrieval of the foreign bodies was carried out in 20 patients through the existing wounds and through separate incisions; all patients were followed up for a minimum of 2 months during which all the complications were registered and managed. Preoperative imaging is a prerequisite for the accurate localization of the foreign body and the subsequent successful removal of it. All patients developed complications that were categorized in this study into those that result from the injury itself and those that occur because of the retrieval procedure, the latter category bei

... Show More
View Publication
Scopus (4)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Using the plastic wastes in fabrication of composite materials for different applications
...Show More Authors

This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Engineering
The Behavior of Bond Strength between Rebar and Concrete in Rubberized Concrete : -
...Show More Authors

Through an experimental program of eighteen specimens presented in this paper, the bond strength between reinforcing bar and rubberized concrete was produced by adding waste tire rubber instead of natural aggregate. The fine and coarse aggregate was replaced in 0%, 25%, and 50% with the small pieces of a waste tire. Natural aggregate replacement ratio, rebar size, embedded rebar length, the rebar yield stress of rebar, cover, and concrete compressive strength were studied in this investigation. Ultimate bond stress, bond stress-slip response, and failure modes were presented. The experimental results reported that a reduction of 19% in bond strength was noticed in 50% replaced rubberized concrete compared with convention

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-kindy College Medical Journal
The Combination Effect of Lidocaine, Ketamine and Atracurium in Intravenous Regional Anesthesia
...Show More Authors

Background: intravenous regional anaesthesia (IVRA) is an effective method of producing anaesthesia of the extremities. Disadvantages are the rapid loss of anaesthesia after the deflation of the tourniquet and the rapid development of postoperative pain. It is important to search for agents with longer durations of action, better nerve fibre selectivity, lesser degrees of motor blockade and lower incidences of systemic toxicity.Objectives: This study was designed to evaluate and compare the clinical effects of intravenous regional anaesthesia, with lidocaine alone, or in a combination with ketamine and atracurium for better analgesia, and to examine the possible clinical advantages of using muscle relaxants (i.e., atracurium) with intrav

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Pharmaceutical Negative Results
The Level of Nitric Oxide Synthase and Nitric Oxide in Hypertensive Women
...Show More Authors

Hypertension is a cardiovascular problem with high rates of epidemiology and risks of morbidity and mortality in the global area. Nitric oxide (NO) is one of the reactive oxygen species (ROS) that produced from L-arginine by nitric oxide synthase (NOS) enzyme. NO involves in various vital processes in human health, one of which is the modulation of vasoconstriction and relaxation of the vascular system. We have aimed to investigate the link between NO and NOS with hypertension in women. The relationship between NO and NOS, as well as the usefulness of them as indicators of hypertension risks were subjects of study in this article. The results have revealed that hypertensive women had significant (P<0.05) lower levels of NO (15.07±3.41 IU/m

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref