the rationalization of energy consumption Require awareness in the possibility of bridging the local need severe shortage of electric power for daily requirements. The research aims to show that the engineers of various specializations and architects, including in particular can have an active role in about the importance of the role of energy in human life, and it’s best utilization without extravagance (which our religion forbids it). Here lies the problem of the research to find possible means and alternative methods to reduce (rationalization) electrical energy consumption in hot dry areas in general which need large energy for air conditioning because of the crucial climate of these regions that making access to the area of human thermal comfort is difficult, and especially in Iraq, as a result of suffering from constraints rationalizing the electric energy consumption, through the use of modern technologies that consistent with our environment, as well as traditional processors to limit the negative impact of climatic conditions on man’s thermal comfort. Based on the premise that there are planning methods related to the characteristics of the urban fabric and architectural solutions related to buildings design that can be used to reduce the negative impact of elements of the harsh climate in our hot dry regions and population access to thermal comfort without total reliance on artificial means of air conditioning. To achieve the goal of the research and make sure of his hypothesis, The research methodology have been based on the collection of theoretical information of climate elements and put some of the methods and processes used in urban planning and buildings design with a direct impact on the characteristics of the urban fabric through which we can reduce the negative impact of climate in our hot dry regions . The practical part adopt the comparative analysis by choosing Al- Adhamiya city in Baghdad, which contain a traditional style with traditional solutions harmonious with our environment, and the modern style with transmitted processors that are often unfit with our environment
Scientists have mastered the codification of the hadeeth and authorship in it, and walked in a variety of courses, including what is known when the late books seal books, which is inclined by Sheikh Sheikh students in the last Council is reading a book of the books of the year or so, and mention a party from the translation of the book owner After that methodology of what he sees important, then speak to the last hadeeth in the book Sindh and Manta, and sometimes market attribution to the author of the book as did Suleiman al-Jamal (God's mercy) deceased in 1204 AH, in this seal on the true Imam Bukhari Which we will investigate and publish. (God willing).
Background: The value of lateral cephalometric radiographs to evaluate the pharyngeal airway is limited because it provided 2-dimensional (2D) images of complex 3-dimensional (3D) anatomic structures. Three dimensional analyses of the airway volumes are required to understand oral and pharyngeal adaptations in mouth breathing and nasal breathing subjects. The aim of this study was to measure the pharyngeal airway volume and the size of the face, then compare between pharyngeal airway volume in mouth breathing and nasal breathing subjects and find the gender difference in each group, also to study the relation between pharyngeal airway volume and the size of the face. Material and Methods: Fifty patients including 28 males and 22 females wit
... Show MoreWith the increasing use of antibiotics around the world, the study and appreciation of antibiotics has become essential. An antibiotic formulation may include one or added active ingredients depending on the type and method of manufacturing the antibiotic. Antibiotics can only combat diseases of bacterial origin. As for viral diseases such as the common cold and influenza, antibiotics will not be able to combat them. The objective of this review is to digest the literature related to estimation of antibiotics and to show the methods that have been used in the estimation of the antibiotics (amoxicillin, ampicillin, cephalothin, carbenicillin, and cefotaxime) in medicinal preparations and a biological fluid for example blood
... Show MoreThe power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha
... Show MoreIn the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreHusbands’ violence towards their wives is one of the greatly important issues in social sciences. Accordingly, the current study aims at determining the levels of violence practiced by husbands towards their wives to propose a professional program from the perspective of the general practice of social work to overcome such a phenomenon. The study is descriptive in nature, where the researcher has used a comprehensive social survey method. To achieve the goal of the study, the researcher has prepared a questionnaire that consisted of two parts. The first part contains the primary data of the two sections, and the second contains (38) phrases distributed over four axes to measure the levels and types of violence among the sample’s memb
... Show MoreOne of the scientific education aims, preparing a student able to keep up with the scientific developments and innovations around him and make him contribute, adapt, investment and continue development. The concepts of nanotechnology from scientific innovation open up an important area of thinking and intervention in the field of chemistry applications in daily life, the technological changes lead to social, political and economic changes which result that the students to have the knowledge, understanding, awareness, appreciation and sense in applications of modern technology for their use optimally, in order to cope with these scientific and technological changes. The research aims at finding out the correlation between the acquisi
... Show More