Preferred Language
Articles
/
jcoeduw-779
Variation in the degree of Continentality climate of Iraq
...Show More Authors

This research paper is about thevariationin the degree of Continentality climate of the
Iraq during (40) years for a number of climate station. Using Poresof formula, it is found out
that the climate of Iraq ranges between extreme Continentality and very extreme
Continentality, and that the Continentality degree is characterized with extreme frequency
from one year to another. In certain years, the degree of climate Continentality decreases
while in other years it rises in such a way that there is no similarity in the Continental degree
from one year to another for the same station.
As for the general trend of the degree of Continentality, the last years had noticed
special variations, which are divided in to three climate regions: the first region exists in the
North and North-East of the country in which the Continentality degree tended to decrease
and it is ranged between-0.2% to -0.6%,while the Continentality degree of the second region,
which is located in the middle and north of the country, tended to rise simply and this ranged
between 0.6% to 1.7%. Finally, the Continentality degree of the third region, which is located
in the south-east tended to a most clear rise which ranged between 2.5% to 8.7%.
By drawing maps of the annual Continentality degree, it is found out that in some
yearsthe area of the extreme Continentality climate and the very extreme Continentality
climate are equal, while in other years, the area of the extreme Continentality climate
becomes much wider and the opposite happens in other years.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 26 2021
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Three-dimensional printing applications in the neurosurgery: A pilot study
...Show More Authors

BACKGROUND: Three-dimensional (3D) printing is an evolving technology that has been used recently in a wide spectrum of applications. AIM: The objective is to evaluate the application of 3D printing in various neurosurgical practice. PATIENTS AND METHODS: This pilot study was conducted in the neurosurgical hospital in Baghdad/Iraq between July 2018 and July 2019. An X, Y, and Z printer was used. The working team included neurosurgeons, biomedical engineers, and bio-technicians. The procedure starts with obtaining Magnetic resonance imaging (MRI) or computed tomography (CT) scan in particular protocols. The MRI, and CT or angiography images were imported into a 3D programmer for DICOM images called 3D slice where these files con

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jan 21 2026
Journal Name
University Of Kirkuk Journal For Administrative And Economic Science
Anova For Fuzzy Data With Practical in The Medical Field
...Show More Authors

This research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.

View Publication Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Journal Of Engineering
Assessing Asphalt and Concrete Pavement Surface Texture in the Field
...Show More Authors

The incorporation of safety characteristics into the traditional pavement structural design or in the functional evaluation of pavement condition has not been established yet. The design has focused on the structural capacity of the roadway so that the pavement can withstand specific level of repetitive loading over the design life. On the other hand, the surface texture condition was neither included in the AASHTO design procedure nor in the present serviceability index measurements.

The pavement surface course should provide adequate levels of friction and ride quality and maintain low levels of noise and roughness. Many transportation departments perform routine skid resistant testing, the type of equipment us

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 24 2022
Journal Name
Arab World English Journal
Conflict in Atwood’s The Handmaid’s Tale: A Critical Discourse Approach
...Show More Authors

Conflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Sep 27 2025
Journal Name
European Scholar Journal
Carrier Liability In Successive Carriage Under The Iraqi Transport Law
...Show More Authors

This study investigates successive carriage, a distinct legal and commercial form of international transport, arising from the absence or irregularity of direct transport routes. Under this system, multiple carriers perform consecutive stages of transport under a single document, with the first carrier fully liable to the consignor or passenger, including breaches in subsequent stages. The research examines the role of direct and indirect transport documents and the concept of recourse, allowing a carrier who has compensated an injured party to seek reimbursement from other carriers. It highlights carriers’ duties to inspect goods, document their condition, and collect freight, and critically analyzes maritime carrier liability under Iraq

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 21 2025
Journal Name
Iklil For Human Studies
Review Article A Feminist Gothic in the American Literary Fiction
...Show More Authors

Teresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce

... Show More
Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
The Quest for Stability in Willa Cathar’s Novle My Antonia
...Show More Authors

    Willa Cather (1873-1947) sought to capture the gradation of human emotion through carefully selected descriptive and narrative touches and firmly controlled management of dramatic scenes, situations, dialogue, and point of view. Cather’s novels and stories drew increasingly upon her personal experiences and memories.

    The old settlement of Virginia and the new lands of Nebraska formed the bedding ground for Willa Cather’s talents; so did the layers of memory she found across the North American continent, from New Mexico to Canada. She saw the full-blooded European immigrants, Czechs and Swedes, plowing the unbroken land, on the way up from peasants to proprietors.

  &nbsp

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 20 2019
Journal Name
Al-nahrain Journal For Engineering Sciences
Inducing Frictional Force to Enhance the Transient Response in Beams
...Show More Authors

This paper studies the effect of contact areas on the transient response of mechanical structures. Precisely, it investigates replacing the ordinary beam of a structure by two beams of half the thickness, which are joined by bolts. The response of these beams is controlled by adjusting the tightening of the connecting bolts and hence changing the magnitude of the induced frictional force between the two beams which affect the beams damping capacity. A cantilever of two beams joined together by bolts has been investigated numerically and experimentally. The numerical analysis was performed using ANSYS-Workbench version 17.2. A good agreement between the numerical and experimental results has been obtained. In general, results s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 08 1999
Journal Name
Abhath Al- Yarmouk [basic Sciences And Engineering]
Model for Predicting the Cracking Moment in Structural Concrete Members
...Show More Authors

Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref