Diyala Governorate was recently exposed to high flood waves discharged from Hemrin Dam. Since the dam was at its full capacity during the flood period, these waves were discharged to the Diyala River. Because of the reduction in Diyala River capacity to 750m3/s, the cities and villages on both sides of the river banks were inundated. Thus, the study's objective is to design a flood escape out of the Diyala River, to discharge the flood wave through it. The flood escape simulation was done by using HEC- RAS software. Two hundred twenty-three cross sections for the escape and 30 cross-sections of the Diyala River were used as geometric data. Depending on the geological formation that the escape passed through, two roughness coefficients of 0.035 and 0.028 were applied. An outflow downstream Hemrin Dam varies from 1100m3/s to 1800m3/s was applied as boundary condition upstream Diyala River. One dimensional hydraulic model was developed for the escape and the river, the results showed that aside weir could be constructed at the escape entrance with crest level 67m.a.m.s.l. and 800m width, followed by drop structure of four rectangular steps, this case provides safe discharge to Diyala River if flood wave of 1500m3/s released from Hemrin Dam.
Orthodontic treatment is an inclusive treatment that includes growth adjustment of the craniofacial area and alveolar bone reconstruction that affects the movement of teeth. Apply orthodontic forces to correct teeth anomaly via alveolar bone remodeling includes a combination of cellular and molecular events in the gum. Orthodontic tooth movement is based on force induced periodontal ligament and alveolar bone remodeling. Mechanical motivation on a tooth causes an inflamed response in the gum tissue. Inflammatory immune markers stimulate the biological processes associated with alveolar bone resorption. The aim of this article is shedding light on the significance role inflammatory immune response in orthodontic treatment.
.
The current study aimed to examine the histomorphological features of the oral salivary ducts and the peacock tongue (Pavo cristatus) of this species. In this study, eight healthy adult peacocks were used after collecting them from a commercial market in Baghdad to investigate and describe the tongue in these bird species. After being euthanized, they were killed by cutting off the major neck blood vessels and bleeding until death; the tongue was identified. The tongue was the sharp end, elongated, somewhat triangular, and measured 8.2 mm. The apex, trunk, and base are its three sections. There are 4 to 5 layers of big conical papillae on the area where the root and body converge. Without gustatory papillae, the dense keratinized ep
... Show MoreBacteriophages have the potential to eliminate both antibiotic-resistant and sensitive bacteria; as a result, they have become a major focus of such research. In contrast to antibiotics, which assault the entire bacterial population without discrimination, bacteriophages have a limited set of characteristics that allow them to target infectious microbes while avoiding friendly species (commensal microbiota). Nevertheless, large groups of naturally occurring bacteriophages that are well-differentiated and selective for the most clinically recognized pathogenic bacterial strains are required. Utilizing genetic engineering techniques that modify the target phage genome to synthesize phages with known characteristics in a brief period o
... Show MoreNowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreNew derivatives of pyromellitamic diacids and pyromellitdiimides have been prepared by the reaction of one mole of pyromellitic dianhydride with two moles of aromatic amines, these derivatives were characterized by elemental analysis, FT-IR and melting point.
The Purpose of this study are analyze financial lease advantage through analyze and discuss financial lease cost, and achieve tax advantage to reach study objective. study include two firms ,oil firm and construction firm with limited liability. The inductive method is used for the applied part in analyzing the financial data of the companies considered in 2011-2015.The result of the study shows that the financial lease achieve present value of the costs is positive. This study found out the results that verify the hypothesis: The tax advantage of financial Leasing is characterized by decreasing cost and achieving higher tax shield. The study also found the most important recommendations of awareness of the benefits arising f
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.