The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.
Objective(s): To evaluate nurses' practices who work in respiratory intensive care units to control the
complications of patients admitted at this unit and determine the relationship between nurses' sociodemographic
characteristics and their practices.
Methodology: A descriptive study was carried out at Respiratory Care Unit at Baghdad teaching hospitals that
started from February 22th, 2013 to August 30th, 2013. A purposive "non-probability" sample of (70) nurses who
work in Respiratory Care Unit was selected from Baghdad teaching hospitals. The data were collected through the
use of constructed questionnaire that consists of two parts; (l) Demographic data form that consists of 7items and
(2) nurses' practice form
Abstract
The current research aims to identify the attitudes towards the Covid-19 vaccine and the Locus of Control (internal, external) among university students, to identify the significance of the difference in attitudes towards the Covid-19 vaccine, the significance of the difference in the Locus of Control (internal, external) according to the gender variable (male, female), and to identify the significance of the difference in students’ attitudes towards Covid-19 vaccine according to the Locus of Control (internal, external). To achieve the objective of the research, the researcher developed two scales, a scale of (20) items to identify the attitudes toward a covid-19 vaccine, and a scale of the locus of c
... Show Moreتم استخدام خرائط ضبط الجودة الإحصائية لتقييم جودة الخدمة التعليمية في جامعة الباحة، ويهدف هذا البحث إلى استخدام خرائط ضبط الجودة الإحصائية لقياس مستوى الجودة وفجوة الجودة بين توقعات الطلبة وإدراكاتهم لمستوى الخدمة الذي تقدمه جامعة الباحة. حيث تم اختيار عينة من 200 طالب وطالبة عشوائيا باستخدام العشوائية العنقودية من 4 كليات خلال الفترة 01 – 30/2015م، وجمعت البيانات من خلال استبيان جودة الخدمة الذي يقيس ت
... Show MoreThis paper investigates a new approach to the rapid control of an upper limb exoskeleton actuator. We used a mathematical model and motion measurements of a human arm to estimate joint torque as a means to control the exoskeleton’s actuator. The proposed arm model is based on a two-pendulum configuration and is used to obtain instantaneous joint torques which are then passed into control law to regulate the actuator torque. Nine subjects volunteered to take part in the experimental protocol, in which inertial measurement units (IMUs) and a digital goniometer were used to measure and estimate the torque profiles. To validate the control law, a Simscape model was developed to simulate the arm model and control law in which measurem
... Show MoreBanks face many of the various risks: which are of dangerous phenomena that cause the state achieved a waste of money and a threat to future development plans to be applied to reach the goals set by: prompting banks and departments to find appropriate solutions and fast: and it was within these solutions rely on Banking risk management and effective role in defining and identifying: measuring and monitoring risk and trying to control and take risks is expected to occur in order to encircle and make it in within acceptable limits: and try to avoid them in the future to reduce the losses that are likely to be exposed to the bank: and it began to emerge and dominate a lot of legislation that seeks to structure the year risk management and t
... Show MoreThis study focuses on improving the safety of embankment dams by considering the effects of vibration due to powerhouse operation on the dam body. The study contains two main parts. In the first part, ANSYS-CFX is used to create the three-dimensional (3D) Finite Volume (FV) model of one vertical Francis turbine unit. The 3D model is run by considering various reservoir conditions and the dimensions of units. The Re-Normalization Group (RNG) k-ε turbulence model is employed, and the physical properties of water and the flow characteristics are defined in the turbine model. In the second phases, a 3D finite element (FE) numerical model for a rock-fill dam is created by using ANSYS®, considering the dam connection with its powerhouse
... Show MorePorous silicon (PS) layers are prepared by anodization for
different etching current densities. The samples are then
characterized the nanocrystalline porous silicon layer by X-Ray
Diffraction (XRD), Atomic Force Microscopy (AFM), Fourier
Transform Infrared (FTIR). PS layers were formed on n-type Si
wafer. Anodized electrically with a 20, 30, 40, 50 and 60 mA/cm2
current density for fixed 10 min etching times. XRD confirms the
formation of porous silicon, the crystal size is reduced toward
nanometric scale of the face centered cubic structure, and peak
becomes a broader with increasing the current density. The AFM
investigation shows the sponge like structure of PS at the lower
current density porous begi
Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More