The goal of the research is to develop a sustainable rating system for roadway projects in Iraq for all of the life cycle stages of the projects which are (planning, design, construction and operation and maintenance). This paper investigates the criteria and its weightings of the suggested roadway rating system depending on sustainable planning activities. The methodology started in suggesting a group of sustainable criteria for planning stage and then suggesting weights from (1-5) points for each one of it. After that data were collected by using a closed questionnaire directed to the roadway experts group in order to verify the criteria weightings based on the relative importance of the roadway related impacts that each credit addresses. Statistical analysis for expert's answers have been evaluated by using factor analysis method to ensure the compatibility and validity of credits selected for the rating system and the actual weights conducted for each criteria by using the factor analysis method by using SPSS program V.19. Finally the researcher put the details for each criterion that contain from aim, requirements and strategies. The researcher reached to that the study of the all life cycle stages is important to make a clear comparison between the roles of the criteria in different stages.
It was recorded that Terpinen-4-ol has an anti-parasitic properties, so it will be noteworthy to intensify the studies about this compound.
This study aims to test the effectiveness of terpinen-4-ol on amastigote forms of Leishmania parasite in macrophages.
This effect was studied by adding increasing concentrations of Terpinen-4-ol to culture wells containing mouse macrophages that were previously incubated with the promastigote forms of the parasites for 24 hours .Then, they were incubated for another 24 hours with increasing concentrations of Terpinen-4-ol. After, Parasites were enumerated into macrophages in wells either treated with Terpinen-4-ol or in control wells.
Treatment with Ter
... Show MoreKE Sharquie, AA Noaimi, GA Ibrahim, AS Al-Husseiny, Our Dermatology Online, 2016 - Cited by 3
The Evolution Of Information Technology And The Use Of Computer Systems Led To Increase Attention To The Use Of Modern Techniques In The Auditing Process , As It Will Overcome Some Of The Human Shortcomings In The Exercise Of Professional Judgment, Then It Can Improve The Efficiency And Effectiveness Of The Audit Process, Where The New Audit Methodologies Espouse The Concept Of Risk Which Includes Strategic Dimension With Regard To The Capacity Of The Entity To Achieve Its Goals, Which Requires Auditors To Rely On Advanced Technology That Can Identify The Factors Which Prevent The Entity From Achieving Its Objectives. The Idea Of Research Is To Preparing An Electronic Program Fer All Audit Work From Planning Through Sampling And Document
... Show MoreThe analytical results of the failure types of six limestone islands in the Ha Long bay of Vietnam have been identified. The calculated results of safety factor for 03 plane failure blocks lie within 0.9 and 2, have high potential failure. The analytical results have been also simulated these islands in three-dimensional space and have been also analyzed their potential failure on the fracture surfaces. The results obtained in this paper have important significance for planning and development of the Ha Long bay area, as World Natural Heritage, Quang Ninh province of Vietnam.
Terrorism is a global phenomenon that engulfs most regions of the world to varying degrees. Media outlets are aware of the many incidents of violence and terrorism that have increased in recent times. The differences between the size of the phenomenon in different societies are the causes and severity of the phenomenon. On the role of local satellite channels in shaping the knowledge and trends of the Iraqi public towards the events of terrorism, in light of the assumptions of reliance on the media. The importance of this study is that it assesses the role of local satellite channels in the formation of knowledge and trends The study seeks to know the extent of exposure of the Iraqi public to local satellite channels, and to reveal the e
... Show MoreThe Growth Differentiation Factor -15 (GDF-15) is a member of the transforming growth factor β superfamily. İt represents an example of the stress response cytokines. It's mostly found in cardiac myocytes, adipocytes, macrophages, endothelial cells, and vascular endothelial cells, whether they're generated normally or not. GDF-15 levels have increased and are associated with cardiovascular risk. Aim of the study: To investigate the correlation between angiotensin-converting enzyme (ACE) inhibitors and angiotensin II receptor blockers (ARBs) with the level of plasma GDF-15 in a group of hypertensive patients. Materials and methods: A case-control study involved 90 individuals, 60 hypertensive patients (36 on ACE inhibitors and 24 on ARBs)
... Show MoreBackground: The aim of this study was to evaluate the shear bond strength (SBS) and adhesive remnant index (ARI) of different orthodontic adhesive systems after exposure to aging media (water storage and acid challenge). Materials and methods: Eighty human upper premolar teeth were extracted for orthodontic purposes and randomly divided into two groups (40 teeth each): the first group in which the bonded teeth were stored in distilled water for 30 days at 37°C, and the second group in which the bonded teeth were subjected to acid challenge. Each group was further subdivided into four subgroups (10 teeth each) according to the type of adhesive system that would be bonded to metal brackets: either non-fluoride releasing adhesive (NFRA),
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThe issue of insurance against unlawful risks raises a jurisprudential and judicial debate between two opposing trends: the first considers coverage of these risks invalid due to their impact on public order or morals, while the second—which this research analyses—calls for the possibility of covering these risks in specific circumstances, based on contractual considerations in accordance with the principle that the contract is the law of the contracting parties, and based on the obligation to compensate the harmed third party—the victim—who has no connection to the unlawful act. In this context, our research highlights that contractual considerations can justify coverage of some unlawful risks, provided that the goal is to achieve
... Show MoreKE Sharquie, AA Al-Nuaimy, WJ Kadhum, Saudi medical journal, 2006 - Cited by 3