Social risks posed a great challenge to the development path in Iraq, which resulted in widening the development gaps, whether these gaps were between rural and embargoed areas, or between Iraqi governorates, and the gender gap. Besides, the nature of the reciprocal relationship between the social risks and the development process requires the adoption of development trends that are sensitive to the risks that take upon themselves the prompt and correct response to these risks, away from randomness and confusion that Iraq suffered from for decades. However, currently, the situation has differed a great deal. This is because the size and types of such gaps have widened and become more complicated than before; a matter which has led to have clear development gaps due to the differences and distances ensued among the Iraqi governments, the areas of rural and urban, in addition to the gender gap. The research has adopted the social sampling method by building a scale consisting of (21) paragraphs and four-way answer alternatives (agree completely, agree, do not agree, do not agree at all). The scale has been applied to a sample of (100) sociology specialist respondents. The research reached several conclusions, the most important of which are: The nature of the rapid and continuous social changes imposed new forms of social risks that are not familiar before and which are difficult to deal with. The problem of persistent inequality at the level of societies and individuals is one of the most serious challenges that can generate new opportunities for more deadly social risks.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThree-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
The Karolinka earth-fill dam was constructed between 1977 and 1984 on the Stanovnice river above the town of Karolinka in the region of Vsetínsko in Czech Republic. Because of leakage on the downstream dam face due to technological indiscipline when filling dam layers during the dam construction stage, there were some steps to improve state dam safety. The final rehabilitation is to construct the diaphragm walls from self-hardening cement-bentonite suspension along the length of the dam. In addition to connecting the gallery and abutment (2 × 25 m long) by using jet piles. The article presents numerical modeling of safety factor evaluation associated with the state of the dam body and foundation; before, and after seal
... Show MorePVA, Starch/PVA, and Starch/PVA/sugar samples of different
concentrations (10, 20, 30 and 40 % wt/wt) were prepared by casting
method. DSC analysis was carried; the results showed only one glass
transition temperature (Tg) for the samples involved, which suggest
that starch/PVA and starch/PVA/sugar blends are miscible. The
miscibility is attributed to the hydrogen bonds between PVA and
starch. This is in a good agreement with (FTIR) results. Tg and Tm
decrease with starch and sugar content compared with that for
(PVA). Systematic decrease in ultimate strength, due to starch and
sugar ratio increase, is attributed to (PVA), which has more hydroxyl
groups that made its ultimate strength higher than that for
In this work semi–empirical method (PM3) calculations are carried out by (MOPAC) computational packages have been employed to calculate the molecular orbital's energies for some organic pollutants. The long– chain quaternary ammonium cations called Iraqi Clays (Bentonite – modified) are used to remove these organic pollutants from water, by adding a small cationic surfactant so as to result in floes which are agglomerates of organobentonite to remove organic pollutants. This calculation which suggests the best surface active material, can be used to modify the adsorption efficiency of aniline , phenol, phenol deriviatives, Tri methyl glycine, ester and pecticides , on Iraqi Clay (bentonite) by comparing the theoretical results w
... Show MoreThe experimental study showed the use of closed cavity wall (the thickness of the cavity 5cm) made a percentage reduction in the cooling load caused by heat gain from the wall by (21.5 %) compared with the conventional wall. also the thermal resistance of the closed cavity was an average (0.2 m2.oC/W).
The experimental results of the study showed that the use of closed cavity wall reduced the average temperature of the inner surface of the wall during the day, and that the reduction was an average (0.45 oC) when compared with the conventional wall , as well as the use of closed cavity wall reduced the temperature difference range of the inner surface of the wall during the day, and that the
... Show More