The aim of this research is subjected to discover The Dictation mistakes which occur
widely in the Arabic Language written by Iraqi – News papers.
The research classified These Mistakes in Three groups as Follows:
1. The first group dealing with distinguishing between the Arabic – letter ) ا ( When Written
or ) أ ( at The beginning The word and as ) ئ ( which differ in meaning from each other .
2. The second group dealing with the writing of The Arabic ) ٙ( and as ) ٛ( at the end of The
word which differ in meaning from each other.
3. The Third group dealing with distinguishing in written The Arabic letter as ) ض( or as ) )ظ
which differ in meaning From each other.
4. The fourth group dealing with The writing The one Arabic – letter sometime as ) ٕ ( and
other time as ) ح( which differ each other .
Experimental research was carried out on eight reinforced concrete beams to study the embedded length of the longitudinal reinforcement. Six beams were casted using self compacted concrete, and the two other beams were casted using normal concrete. The test was carried out on beams subjected to two point loads. The strain and the slip of the main reinforcement have been measured by using grooves placed during casting the beams at certain places. The measured strain used to calculate the longitudinal stresses (bond stress) surrounding the bar reinforcement, The study was investigated the using of self compacted concrete SCC on the embedded length of reinforcing bars, and comparing the results with normal concrete. The test results show th
... Show MoreIn our current era, women need to practice sports activities in order to compensate for the lack of movement. The development of life and the introduction of technology in all fields contributed to reducing body movements to the maximum. Many movements were also shortened, and some parts of the body became almost static. All machines became available in homes. Necessary to help women clean and cook. The presence of transportation also restricted women, so the walking sport that women used to practice when they went shopping in nearby places or to visit friends disappeared. As a result, many health problems emerged, prompting some developed countries to allocate financial aid with the help of insurance companies to these patients.The researc
... Show MoreIn this present paper, an experimental study of some plasma characteristics in dielectric barrier discharge (DBD) system using several variables, such as different frequencies and using two different electrodes metals(aluminium (Al) and copper (Cu)), is represented. The discharge plasma was produced by an AC power supply source of 6 and 7 kHz frequencies for the nitrogen gas spectrum and for two different electrodes metals(Al and Cu). Optical emission spectrometer was used to study plasma properties (such as electron temperature ( ), electron number density ( ), Debye length ( ), and plasma frequency ( )). In addition, images were analysed for the plasma emission intensity at atmospheric air pressure.
In the present work, steady, laminar natural convection in nonrectangular enclosures is analyzed numerically with and without fin. Vertical walls insulated while horizontal walls maintained isothermal at different temperature and the fin was placed on horizontal surface. The length of fin was equal (B/L=0.22, 0.44 and 0.66) and thickness of fin was constant. Various parameters are studied: Rayleigh number (from 104 to 107 ), Prandtl number (0.7), number of fin change from (1-3) and aspect ratio (H/L= 0.15 to 0.5). The problem is formulated in terms of the vorticity-stream function procedure. A numerical solution based on program in Fortran 90 with Tec plot program. The finite difference method is used. Streamlines and isotherms are prese
... Show MoreStream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha
... Show MoreBackground: footballers may have poor oral health like elevated levels of dental caries. The purpose of this study was to estimate the prevalence and severity of dental caries in Iraqi footballers and to measure dental treatments needs. Materials and methods: 403 Iraqi males footballers aged from 18-32 years were included in the study. The cases were recruited from 18 clubs in Baghdad city. Results: the results of present study showed increased percent of caries experience according to age increase and decreased dental caries percent as education level increased among Iraqi footballers. Decayed component was found to be the largest of DMFS value compared to MS and FS among all age groups, Caries experience was found to be increased as age
... Show MoreNosocomial infections are one of the most important causes of mortality and morbidity in hospitals. These are major public health problems worldwide, but particularly in developing countries. The purpose of this research was to analyze the frequency of the microorganisms in the specimens taken from the surgical wounds, and to examine antimicrobial susceptibility for some isolates . Wound swabs were examined from June 2010 to January 2011. The isolates were identified by conventional methods, antimicrobial susceptibility testing was performed by Kirby-Bauer disc diffusion method as per NCCLS guidelines.A total of 102 wound swabs were examined 22(21.56%) swabs were sterile and 80(78.43%) were positive for microorganisms. The results showed
... Show MoreAlthough language research has focused on blackmail in general, less attention has been paid to emotional blackmail. To date, researchers could not locate any literature that examines emotional blackmail from a linguistic standpoint. The current study is intended to fill this gap by scrutinizing emotional blackmail from a pragma-stylistic point of view by examining the style of the characters in selected episodes extracted from the American Breaking Bad series. To carry out the study, an eclectic model comprising kinds of emotional blackmailers by Forward and Frazier (1997), Searles’ speech acts (1979), Grice’s maxims (1975), Brown and Levinson’s politeness (1987), Culpeper’s impoliteness (1996), and Simpson’s stylistic le
... Show MoreIn recent years, Wireless Sensor Networks (WSNs) are attracting more attention in many fields as they are extensively used in a wide range of applications, such as environment monitoring, the Internet of Things, industrial operation control, electric distribution, and the oil industry. One of the major concerns in these networks is the limited energy sources. Clustering and routing algorithms represent one of the critical issues that directly contribute to power consumption in WSNs. Therefore, optimization techniques and routing protocols for such networks have to be studied and developed. This paper focuses on the most recent studies and algorithms that handle energy-efficiency clustering and routing in WSNs. In addition, the prime
... Show More