Road accidents have been identified as one of the main causes of death and have a significant effect on public health challenges, economic growth and development. The Iraqi transport infrastructure has suffered from the effects of war, carelessness, and lack of investment. As a result, road traffic accidents have increased, and the current efforts to address road safety are minimal in comparison to the growing level of citizen suffering. The objective of this study was to provincially analyze traffic accidents in Iraq using data from 2010 to 2020 to shed light on the current situation. Three key conclusions were made from the results: first, people aged 35 years and under was the age group recorded in the most traffic accidents; second, Al-Najaf province recorded the highest rate of traffic accidents; and third, COVID-19 lockdown in Iraq caused a 28.5 % decline in traffic accidents while fatality and injury rates fell by 28 % and 18.4 % respectively, when comparing with the data of the same period in 2019.
The main problem of the current study concentrates on applying critical discourse analysis to examine textual, discoursal and social features of reduplication in some selected English newspaper headlines. The main aim of the current study is to analyze the linguistic features of reduplication by adopting Fairclough's three-dimensional model (2001). This study sets forth the following hypotheses: (1) English headline – newspapers comprise various textual, discoursal and social features ;(2)the model of analysis is best suited for the current study.To achieve the aims and verify the hypotheses, a critical discourse analysis approach is used represented by Fairclough's socio-cultural approach (2001).The present study has examined the use of
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show MoreThe thermal and electrical performance of different designs of air based hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and
... Show MoreThe main objective of this research is to find out the effect of deviation in the aggregate gradients of asphalt mixtures from the Job Mix Formula (JMF) on the general mixture performance. Three road layers were worked on (wearing layer, binder layer, and base layer) and statistical analysis was performed for the data of completed projects in Baghdad city, and the sieve that carried the largest number of deviations for each layer was identified. No.8 sieve (2.36mm), No.50 sieve (0.3mm), and 3/8'' sieve (9.5mm) had the largest number of deviations in the wearing layer, the binder layer, and the base layer respectively. After that, a mixture called Mix 1, was made. This mixture was selected from a number of completed mixtures, and it
... Show MoreDust storms are a common ecological occurrence in many world‘s countries, mainly in dry and semi-dry parts. Dust storms tremendously influence human health, the environment, the climate, and numerous social aspects. In this paper, spatial and temporal analysis, metrological triggers, and trajectory, dust exporting areas of a severe dust storm that occurred in Iraq on May 16, 2022, were investigated. The dust storm's backward trajectory was determined using HYSPLIT model, which is then compared with MODIS and Meteosat satellite images. The weather is then analyzed using the NCEP/NCAR Reanalysis model, and the approximate area of these sources was determined using Landsat 8 satellite image classification method. The results revealed
... Show MoreThe dimensions of bubbles were measured in a stirrer tank electrochemical reactor, where the analysis of the bubble size distribution has a substantial impact on the flow dynamics. The high-speed camera and image processing methods were used to obtain a reliable photo. The influence of varied air flow rates (0.3; 0.5; 1 l/min) on BSD was thoroughly investigated. Two types of distributors (cubic and circular) were examined, and the impact of various airflow rates on BSD was investigated in detail. The results showed that the bubbles for the two distributors were between 0.5 and 4.5 mm. For both distributors at each airflow, the Sauter mean diameter for the bubbles was calculated. According to the results, as the flow rate raised, the bubb
... Show MoreTo investigate the prevalence of true periodontal chief complaints (CC) and the factors affecting their reporting by patients with periodontal diseases (PD).
This cross‐sectional study was based on retrospective analysis of available periodontal records. Different personal and demographic variables were obtained from these records including CC, age, gender, working status, past medical/dental history, smoking status and diagnosis. In addition, clinical parameters of plaque index, gingival index, probing pocket depth (PPD), and number of missing teeth. Periodontal CC were r
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreIn this paper, a least squares group finite element method for solving coupled Burgers' problem in 2-D is presented. A fully discrete formulation of least squares finite element method is analyzed, the backward-Euler scheme for the time variable is considered, the discretization with respect to space variable is applied as biquadratic quadrangular elements with nine nodes for each element. The continuity, ellipticity, stability condition and error estimate of least squares group finite element method are proved. The theoretical results show that the error estimate of this method is . The numerical results are compared with the exact solution and other available literature when the convection-dominated case to illustrate the effic
... Show More