Preferred Language
Articles
/
jcoeduw-194
A New Vision in the Locality and the Factors of Forming Meander
...Show More Authors

The research addressed an analytical field investigation of the locality of meander, the factors responsible of the locality of the meander at certain points of the stream other than others, and the role sequence of these factors in the formation process.
The research revealed that the location of forming the meander was associated closely with the scale structural composition of the bank materials from which the first stage of forming the curved stream, for the inhomogeneous or non-identical opposite banks in their scale structural composition saw an activity of differential corrosion, while the homogeneous and identical opposite banks in their scale structural composition saw an identical corrosion activity in its intensity at both banks. The research investigated in field the presence of scale variation of the materials of opposite banks in the location of forming the meander which was not found at the incurved stream banks by taking samples and analyze them in scale. The analysis results showed that the synclinal bank was with high sand ratio which was the reason behind the activity of corrosion process due to its weak cohesion, high permeability, and highroughness creating an environment of frequent turmoil reverse eddy currents. As to its opposite bank which represented the convex bank, the results of the scale analysis showed its soil to be with high content of mud; therefore, it was resistant to the corrosion activity compared to the synclinal bank, being more cohesive and of weak permeability, it was soft, so it did not create a turmoil eddy motional environment of the aquatic currents. While in the incurved stream, the results of the scale analysis showed that the soil of both opposite banks were identical in its volume content; therefore, the activity of the corrosion process was identical at both banks and its high sand ratio resulted in the expansion of the stream and not its fold.
The research revealed that the circularity of the curved stream imposed the presence of the centrifugal force which appeared in the domains of the circular motion, changing the concentration locations of the currents. As it is well-known, the fastest currents in the river are those which locate far away from the bottom and the banks, and are found in the middle of the stream which we really found in the incurved stream, but due to the control of the centrifugal force, we found that the fastest currents were concentrated at the synclinal banks and that the slowest currents were concentrated at the synclinal banks, which explains logically and realistically due to the contrast of the corrosion and sediment activity in the curved river streams and the presence of centrifugal force was responsible of the development of these streams from fold to curve to turn to cut lake.
The research defined the morphology of the curved stream at any stage of the development stages at the presence of three corrosion units that represent the synclinal banks meeting three sedimentary units represent the convex banks, two of which were opposite to each other represent overall the neck of the stream and the stream in its complete shape was represented by the overall of these corners

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Physics
Calculation of the longitudinal electron scattering form factors for the 2s-1d shell nuclei
...Show More Authors

An Expression for the transition charge density is investigated
where the deformation in nuclear collective modes is taken into
consideration besides the shell model transition density. The
inelastic longitudinal C2 and C4 form factors are calculated using
this transition charge density for the Ne Mg 20 24 , , Si 28 and S 32
nuclei. In this work, the core polarization transition density is
evaluated by adopting the shape of Tassie model togther with the
derived form of the ground state two-body charge density
distributions (2BCDD's). It is noticed that the core polarization
effects which represent the collective modes are essential in
obtaining a remarkable agreement between the calculated inelastic
longi

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparative Study for the Early Detection of the most Important Factors Leading to Preeclampsia
...Show More Authors

 

The aim of this research is to determine the most important and main factors that lead to Preeclampsia. It is also about finding suitable solutions to eradicate these factors and avoid them in order to prevent getting Preeclampsia. To achieve this, a case study sample of (40) patients from Medical City - Oncology Teaching Hospital was used to collect data by a questionnaire which contained (17) reasons to be investigated. The statistical package (SPSS) was used to compare the results of the data analysis through two methods (Radial Bases Function Network) and (Factorial Analysis). Important results were obtained, the two methods determined the same factors that could represent the direct reason which causes Preecla

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Iraqi Journal Of Physics
Calculation of the Longitudinal Electron Scattering Form Factors for the 2s-1d Shell Nuclei
...Show More Authors

Inelastic longitudinal electron scattering form factors have been calculated for isoscaler transition
T = 0 of the (0+ ®2+ ) and (0+ ®4+ ) transitions for the 20Ne ,24Mg and 28Si nuclei. Model
space wave function defined by the orbits 1d5 2 ,2s1 2 and 1d3 2 can not give reasonable result for
the form factor. The core-polarization effects are evaluated by adopting the shape of the Tassie-
Model, together with the calculated ground Charge Density Distribution CDD for the low mass 2s-1d
shell nuclei using the occupation number of the states where the sub-shell 2s is included with an
occupation number of protons (a ) .

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Role of a University Professor in the Development of Democracy with the Contents of a University Student in the Light of a Democratic Society
...Show More Authors

The current research aims to answer the following questions: what is the substance of democracy? What is the content of a democratic society? What is the role of university professor in the democratic development of the student university in light of the new Iraqi society? In order to achieve the goals of the research, the researcher developed an a questionnaire based on literature, Iraq's draft constitution in 2005, and his experience of the field of teaching human rights and public freedoms and the teaching of democracy. It was applied to a sample of faculty members in Department of Education and Psychology / College of Education / University Baghdad for the year 20014 were obtained their answers were then processed statistically. Henc

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play: The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play
...Show More Authors

Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppre

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 10 2024
Journal Name
American Journal Of Economics And Business Innovation
Factors Associated with Employees’ Intention to Leave in ICT Sector in Iraq: A Factor Analysis
...Show More Authors

The current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, name

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The American Medical Directors Association
Comprehensive Literature Review of Factors Influencing Medication Safety in Nursing Homes: Using a Systems Model
...Show More Authors

View Publication
Scopus (47)
Crossref (49)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
International Journal Of Drug Delivery Technology
Association between some risk factors with hormonal state in a sample of infertile iraqi women
...Show More Authors

Scopus