Expansive soils are recognized by their swelling potential upon wetting due to the existence of some clay minerals such as montmorillonite. An effective solution was found to avoid the danger of such soils by using piles. A single pile embedded in an elasto-plastic expansive soil has been analyzed by using one of the available software which is ABAQUS to investigate the effect of applied loads on pile’s top and investigate the effect of swelling soils on load carrying capacity of the pile. The result shows that as the pile is axially loaded at its top, the axial force along the pile gradually changes from (tension) to (compression) and the pile tends to move downward. The applied load needed to initiate pile’s settlement depends on pile’s embedment depth and the depth of active zone. The ultimate carrying capacity of a single pile for no swelling conditions is greater than that of with swelling conditions.
The right to property is one of the most fundamental rights enjoyed by individuals, and most national constitutions and laws, as well as international conventions, have to be respected and protected only in accordance with the economic and social development of the country (the so-called public benefit) and in return for just compensation. What is fair compensation?
The concept of decolonization of trauma has intrigued researchers for years due to its prolonged effect on personal and cultural levels. The process of intellectual decolonization involves defensive survival mechanisms, such as cultural rituals using traditional practices, nostalgic dialogues that idealize memories and recollections, and conversations about identity to navigate postcolonial trauma displacement. Symbolic connections evoke strong emotional responses, bridging the gap between the characters‘ physical dislocation and their imaginary homeland. Cocooning identity represents a space where a multidimensional self emerges—one that holds the victim of trauma, the survivor who endures, and the narrator, who constructs an idealized
... Show MoreThe present study reports Morchella conica Pers.1818, which belongs to the family, Morchellaceae as a new record of Iraqi macromycota based on the morphological and molecular methods. During their short and often sporadic fruiting season, this fungal species was found in mixed forest unburned areas in Branan ranges (Suliamaniya Province, Northeast Iraq). Currently, M. conica is the second Morchella species reported from Iraq. The current study aimed to introduce this new record, which is poorly studied in the Middle East. M. conica is morphologically described and phylogenetically confirmed. The relationship between this species and other species within the genus was studied using the nrDNA ITS sequences from different species and divers
... Show MoreBackground: Nursing interventions tailored to the smoking triggers in patients with non-communicable chronic diseases are essential. However, these interventions are scant due to the nature of factors associated with smoking cessation and the poor understanding of the effect of nurse-led intervention in Iraq.Purpose: This study aimed to determine the dominant smoking triggers and examine the effects of a tailored nursing intervention on smoking behavior in patients with non-communicable chronic diseases.Methods: Convenience samples of 128 patients with non-communicable chronic diseases, male and female patients, who were 18-70 years old, were recruited in this quasi-experimental, randomized comparative trial in the outpatient clinic
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreSince the law is the tool for implementing the state’s public policies, it is natural that its provisions (or at least some of them) seek to preserve human dignity as the source on which all rights and freedoms are based. One of the examples of humanizing the provisions of the law in France is what is known as the winter truce. What is this truce, what are the justifications for granting it, what is its historical origin, how did the legislative treatment of it develop, what are the similarities and differences between it and other legal periods included in French law, what is the scope of its application, and what are the effects resulting from it. These questions and others are what we will try to answer through this research.
KE Sharquie, SA Al-Mashhadani, AA Noaimi, AA Hasan, Journal of Cutaneous and Aesthetic Surgery, 2012 - Cited by 19
Compassion competence is a nurse's ability to provide patient-centered care and communicate with patients in a sensitive and insightful manner. This descriptive cross-sectional survey study aimed to assess the compassion competence of a multinational group of nursing students.
A total of 1,158 undergraduate nursing students participated in this study, and stratified random sampling method was used to select participants from the 100 study level to the 400 or 500 level. Data were collected using the Compassion Competence Scale.
<The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show More