The research addressed an analytical field investigation of the locality of meander, the factors responsible of the locality of the meander at certain points of the stream other than others, and the role sequence of these factors in the formation process.
The research revealed that the location of forming the meander was associated closely with the scale structural composition of the bank materials from which the first stage of forming the curved stream, for the inhomogeneous or non-identical opposite banks in their scale structural composition saw an activity of differential corrosion, while the homogeneous and identical opposite banks in their scale structural composition saw an identical corrosion activity in its intensity at both banks. The research investigated in field the presence of scale variation of the materials of opposite banks in the location of forming the meander which was not found at the incurved stream banks by taking samples and analyze them in scale. The analysis results showed that the synclinal bank was with high sand ratio which was the reason behind the activity of corrosion process due to its weak cohesion, high permeability, and highroughness creating an environment of frequent turmoil reverse eddy currents. As to its opposite bank which represented the convex bank, the results of the scale analysis showed its soil to be with high content of mud; therefore, it was resistant to the corrosion activity compared to the synclinal bank, being more cohesive and of weak permeability, it was soft, so it did not create a turmoil eddy motional environment of the aquatic currents. While in the incurved stream, the results of the scale analysis showed that the soil of both opposite banks were identical in its volume content; therefore, the activity of the corrosion process was identical at both banks and its high sand ratio resulted in the expansion of the stream and not its fold.
The research revealed that the circularity of the curved stream imposed the presence of the centrifugal force which appeared in the domains of the circular motion, changing the concentration locations of the currents. As it is well-known, the fastest currents in the river are those which locate far away from the bottom and the banks, and are found in the middle of the stream which we really found in the incurved stream, but due to the control of the centrifugal force, we found that the fastest currents were concentrated at the synclinal banks and that the slowest currents were concentrated at the synclinal banks, which explains logically and realistically due to the contrast of the corrosion and sediment activity in the curved river streams and the presence of centrifugal force was responsible of the development of these streams from fold to curve to turn to cut lake.
The research defined the morphology of the curved stream at any stage of the development stages at the presence of three corrosion units that represent the synclinal banks meeting three sedimentary units represent the convex banks, two of which were opposite to each other represent overall the neck of the stream and the stream in its complete shape was represented by the overall of these corners
Inelastic longitudinal electron scattering form factors have been calculated for isoscaler transition
T = 0 of the (0+ ®2+ ) and (0+ ®4+ ) transitions for the 20Ne ,24Mg and 28Si nuclei. Model
space wave function defined by the orbits 1d5 2 ,2s1 2 and 1d3 2 can not give reasonable result for
the form factor. The core-polarization effects are evaluated by adopting the shape of the Tassie-
Model, together with the calculated ground Charge Density Distribution CDD for the low mass 2s-1d
shell nuclei using the occupation number of the states where the sub-shell 2s is included with an
occupation number of protons (a ) .
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThis research deals with number of novels for Marguerit Doras , specially A Bridge Towards Basfic and The Lover . we specialize the first chapter for discussing a very important issue , which is the Maraguerit Doras novelist world in another word the most important themes . that we discuss and through that we tried to clerify the privacy the characters of Marguerit Doras in comparative with her own generation and in the second chapter we discussed the most important characteristics of the romantic hero spedially the characteristics of women in her novels.
Rheumatoid arthritis (RA) is characterized by persistent joint inflammation, which is a defining feature of this chronic inflammatory condition. Considerable advancements have been made in the field of disease-modifying anti-rheumatic medicines (DMARDs), which effectively mitigate inflammation and forestall further joint deterioration. Anti-tumor necrosis factor-alpha (TNF-α) drugs, which are a class of biological DMARDs (bDMARDs), have been efficaciously employed in the treatment of RA in recent times Adalimumab, a TNF inhibitor, has demonstrated significant efficacy in reducing disease symptoms and halting disease progression in patients with RA. However, its use is associated with major side effects and high costs. In addition,
... Show MoreWe have focused the research problem through an assessment of the applicability of the third pillar of the decisions of the Basel Committee 11 (market discipline) or not and its impact on both the adequacy of bank capital, supervisory oversight and banking risks and the statement weaknesses commitment banking institutions and which in turn lead to the stability of the financial system as a whole. .
The research is important statement on the importance of big capital in the banking business and the attributes of a role in the absorption of losses suffered by the bank, which reflects the willin
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
research objectives to:
1. identify the social, economic and cultural factors affecting consumption.
2. detect the consumption culture among the population in the city of Erbil.
3. Identify the GATT consumer protection and rights.
The most important results:
1. that there is variation in the answers of respondents about keep up with modernity in the basic consumption (necessary), it swallowed the proportion of yes answers about keep up with modernity in food consumption (72%), and is an indication of growing consumer awareness of the individual in the side of nutrition. The clothing on the side of the proportion of yes answers amounted to (85%), in the health field note that the percentage of yes answers (83%), who are abr
The effect of short range correlations on the inelastic longitudinal
Coulomb form factors for different states of J 4 , T 1with
excitation energies 3.553,7.114, 8.960 and 10.310 MeV in 18O is
analyzed. This effect (which depends on the correlation parameter )
is inserted into the ground state charge density distribution through
the Jastrow type correlation function. The single particle harmonic
oscillator wave function is used with an oscillator size parameter b.
The parameters and b are considered as free parameters, adjusted
for each excited state separately so as to reproduce the experimental
root mean square charge radius of 18O. The model space of 18O does
not contribute to the tra
Abstract The present work included morphological, anatomical, and palynological characters for the new species Acaalypha australis L. specimens, which belong to the family Euphorbiaceae. The species recorded in the study for the first time in Iraq. The plants of this species are annual herbs with green, striated or sub – polygonal stem, and branched near bases, Leaves are simple spirally alternate and lanceolate in shape. Flowers are unisexual, arranged in the axial of distinct leafy and cordate bracts, female flower arranged at the bracts bases and each flower with trileafed perianth and superior ovary with trilobed stylar stigma which has dense and coiled stigmatic hairs. Male flowers are arranged as a mixed verticellate inflorescence a
... Show MoreBackground: Toxoplasmosis is a very common infection caused by the obligate intracellular protozoan parasite. This parasite is called Toxoplasma gondii widely distributed around the world . Toxoplasma gondii can be vertically transmitted to the fetus during pregnancy and may cause wide range of clinical manifestations in the offspring.
Objective: To determine seroprevalence Immunoglobulin G (IgG) and Immunoglobulin M (IgM ) to toxoplasma gondii among pregnant women and to identify the risk factors.
Type of the study: A cross-sectional study.
Methods: A total of 110 blood samples of pregnant women were collected from
... Show More