Preferred Language
Articles
/
jcoeduw-194
A New Vision in the Locality and the Factors of Forming Meander
...Show More Authors

The research addressed an analytical field investigation of the locality of meander, the factors responsible of the locality of the meander at certain points of the stream other than others, and the role sequence of these factors in the formation process.
The research revealed that the location of forming the meander was associated closely with the scale structural composition of the bank materials from which the first stage of forming the curved stream, for the inhomogeneous or non-identical opposite banks in their scale structural composition saw an activity of differential corrosion, while the homogeneous and identical opposite banks in their scale structural composition saw an identical corrosion activity in its intensity at both banks. The research investigated in field the presence of scale variation of the materials of opposite banks in the location of forming the meander which was not found at the incurved stream banks by taking samples and analyze them in scale. The analysis results showed that the synclinal bank was with high sand ratio which was the reason behind the activity of corrosion process due to its weak cohesion, high permeability, and highroughness creating an environment of frequent turmoil reverse eddy currents. As to its opposite bank which represented the convex bank, the results of the scale analysis showed its soil to be with high content of mud; therefore, it was resistant to the corrosion activity compared to the synclinal bank, being more cohesive and of weak permeability, it was soft, so it did not create a turmoil eddy motional environment of the aquatic currents. While in the incurved stream, the results of the scale analysis showed that the soil of both opposite banks were identical in its volume content; therefore, the activity of the corrosion process was identical at both banks and its high sand ratio resulted in the expansion of the stream and not its fold.
The research revealed that the circularity of the curved stream imposed the presence of the centrifugal force which appeared in the domains of the circular motion, changing the concentration locations of the currents. As it is well-known, the fastest currents in the river are those which locate far away from the bottom and the banks, and are found in the middle of the stream which we really found in the incurved stream, but due to the control of the centrifugal force, we found that the fastest currents were concentrated at the synclinal banks and that the slowest currents were concentrated at the synclinal banks, which explains logically and realistically due to the contrast of the corrosion and sediment activity in the curved river streams and the presence of centrifugal force was responsible of the development of these streams from fold to curve to turn to cut lake.
The research defined the morphology of the curved stream at any stage of the development stages at the presence of three corrosion units that represent the synclinal banks meeting three sedimentary units represent the convex banks, two of which were opposite to each other represent overall the neck of the stream and the stream in its complete shape was represented by the overall of these corners

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 04 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Factors Influencing Adalimumab Treatment Response in Patients with Rheumatoid Arthritis: The Future of Clinical Expertise
...Show More Authors

Rheumatoid arthritis (RA) is characterized by persistent joint inflammation, which is a defining feature of this chronic inflammatory condition. Considerable advancements have been made in the field of disease-modifying anti-rheumatic medicines (DMARDs), which effectively mitigate inflammation and forestall further joint deterioration. Anti-tumor necrosis factor-alpha (TNF-α) drugs, which are a class of biological DMARDs (bDMARDs), have been efficaciously employed in the treatment of RA in recent times Adalimumab, a TNF inhibitor, has demonstrated significant efficacy in reducing disease symptoms and halting disease progression in patients with RA. However, its use is associated with major side effects and high costs. In addition,

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Environmental Compatibility of the Suggested New Cities Study Area -Samawah New City
...Show More Authors
Abstract<p>The research presented the experience of creating a new sustainable city, and this experience of establishing an Eco-City (Environmentally friendly) is considered the first experience in Iraq. The current study stressed the importance of the need for environmental planning in the early stages of planning new cities based on realism in planning, design and implementation. Subsequently, that aims to preserve the ecosystem, which is difficult to compensate if degraded or polluted. The research incorporated environmental planning indicators within sustainable urban planning (Reliance on generating electric power that is based on clean and renewable energy sources, Availability of public t</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Sun May 15 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Population growth and the culture of consumption A field study in the city of Arbil.: Population growth and the culture of consumption A field study in the city of Arbil.
...Show More Authors

research objectives to:
1. identify the social, economic and cultural factors affecting consumption.
2. detect the consumption culture among the population in the city of Erbil.
3. Identify the GATT consumer protection and rights.
The most important results:
1. that there is variation in the answers of respondents about keep up with modernity in the basic consumption (necessary), it swallowed the proportion of yes answers about keep up with modernity in food consumption (72%), and is an indication of growing consumer awareness of the individual in the side of nutrition. The clothing on the side of the proportion of yes answers amounted to (85%), in the health field note that the percentage of yes answers (83%), who are abr

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
The effect of short range correlation on the inelastic C4 form factors of 18O nucleus
...Show More Authors

The effect of short range correlations on the inelastic longitudinal
Coulomb form factors for different states of J   4 , T  1with
excitation energies 3.553,7.114, 8.960 and 10.310 MeV in 18O is
analyzed. This effect (which depends on the correlation parameter )
is inserted into the ground state charge density distribution through
the Jastrow type correlation function. The single particle harmonic
oscillator wave function is used with an oscillator size parameter b.
The parameters  and b are considered as free parameters, adjusted
for each excited state separately so as to reproduce the experimental
root mean square charge radius of 18O. The model space of 18O does
not contribute to the tra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play: The Image of the Soldier in Brendan Behan's The Hostage And Charles Fuller's A Soldiers Play
...Show More Authors

Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppre

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Preparation, Spectroscopy, Biological Activities and Thermodynamic Studies of New Complexes of Some Metal Ions with 2-[5-(2-Hydroxy-Phenyl)- 1,3,4-Thiadiazol-2-Ylimino]-Methyl-Naphthalen-1-Ol]
...Show More Authors

This study describes the preparation of new series of tetra-dentate N2O2 dinuclear complexes (Cr3+, Co2+, Cu2+) of the Schiff base derived from condensation of 1-Hydroxy-naphthalene-2-carbaldehyde with 2-amino-5-(2-hydroxy-phenyl)-1,3,4-thiadiazole. The structures of the ligands were identified using IR, UV-Vis , mass,  elemental analysis and 1H-NMR techniques. All prepared complexes have been characterized by conductance measurement, magnetic susceptibility, electronic spectra, infrared spectrum, theromgravimatric analysis (TGA) and metal analysis by atomic absorption. From stoichiometry of metal to ligand and all measurements show a octahedral geometry proposed for all

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Preparation, Spectroscopy, Biological Activities and Thermodynamic Studies of New Complexes of Some Metal Ions with 2-[5-(2-Hydroxy-Phenyl)- 1,3,4-Thiadiazol-2-Ylimino]-Methyl-Naphthalen-1-Ol]
...Show More Authors

This study describes the preparation of new series of tetra-dentate N2O2 dinuclear complexes (Cr3+, Co2+, Cu2+) of the Schiff base derived from condensation of 1-Hydroxy-naphthalene-2-carbaldehyde with 2-amino-5-(2-hydroxy-phenyl)-1,3,4-thiadiazole. The structures of the ligands were identified using IR, UV-Vis , mass,  elemental analysis and 1H-NMR techniques. All prepared complexes have been characterized by conductance measurement, magnetic susceptibility, electronic spectra, infrared spectrum, theromgravimatric analysis (TGA) and metal analysis by atomic absorption. From stoichiometry of metal to ligand and all measurements show a octahedral geometry proposed for all complexes of the (Cr3+, Co2+, Cu2+). conductivity measurement shows t

... Show More
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Special Education Teachers’ Perceptions of the Factors lead to School Bullying of Students with Intellectual Disabilities in Asir
...Show More Authors

Abstract

This study aims to identify the most prominent factors that lead to bullying of students with intellectual disabilities in primary and middle schools from the perspectives of special education teachers. A quantitative descriptive approach was utilized. A questionnaire was used as a tool for data collection. The sample consisted of (72) male and female teachers from the Asir region in the Kingdom of Saudi Arabia. The results revealed the most prominent factors that lead to bullying as follows: factors associated with the school and its policies, factors associated with peers, factors associated with students with intellectual disabilities, and factors associated with general education teachers. The findin

... Show More
View Publication Preview PDF