This paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groy
... Show MoreSince its start spreed "Severe acute respiratory syndrome coronavirus 2" was discovered in Wuhan, China.that is chargeable COVID-19, a pandemic virus, has end up a widespread fitness hassle everywhere in the global Over 2.1 million people have been affected. We analyze serum concentration of CD4 marker and CD8 marker depend in COVID-19 sufferers, and to make clear a relationship between these variables and disorder Progression and severity For those purpose, (158) sufferers with COVID-19 (showed with the aid of using polymerase chain reaction) and (22) seemingly wholesome human beings have been protected withinside the present day examine and taken into consideration as a manipulate group. All examine population (sufferers and manipulate) h
... Show MoreThe tax base is one of the bases of the technical organizing of taxes, and that a good selection of the tax base effects the outcome of the tax and its fairness, and with the expansion of the tax range results a dangerous phenomenon called tax evasion, which became threaten the economies of countries and this phenomenon prevents the achievement of the state to its economic, political and social objectives which seeks to resolve this phenomenon and identifying all human and material potential and realize the real reasons that lie behind it. The researcher found that tax authorities are weak in terms of it the technical material and financial abilities, the analysis of data show that then is a significant reve
... Show MoreLeap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F
... Show MoreBackground: Pain and the usage of local anesthetic agents are still real problem in pediatric dentistry, for these reasons, the use of minimal invasive dentistry (MID) in regard to the patient comfort is important especially for children, anxious and uncooperative patients. Chemomechanical caries removal (CMCR) methods involve the selective removal of the carious dentine hence it avoided the painful removal of the sound dentine and the anxiety resulted due to the vibration of the hand piece which is also decreased thus it appears to be more acceptable and comfortable to the patient. Aims of this study: This study was conducted among group of children to assess and compare the anxiety rating scale (during and after treatment) between the
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreAbstract
On 11/1/2008 amounts of snows fell on various sections of Iraq, one of
which is Baghdad. The analysis process of climatic maps proved that the
advance trough of Sudanese depression towards the city is the reason behind
the formation of this weather state supported by could trough in the (500) mb
pressure level. .
The research concluded that the phenomenon of global warming
witnessed by the world recently had a main role in the occurrence of this
phenomenon due to the raise in earth temperature as a result of evaporation
rate increase leading to an increase in water vapor and cloud formation with
high tops and low bases which form sows with high rates accumulating at high
and moderate latitudes le
Objectives: This study aims to assess the quality of life of cerebral palsy children less than 12 years old reported by
parents in Erbil city/Iraq.
Methodology: A descriptive study was conducted during 2014, to describe the quality of life of cerebral palsy
children. One hundred mothers have cerebral palsy children were participated in this study. The study took place at
Helena Center for handicapped children in Erbil City. Questionnaire was used to collect data, which consists of two
main parts. The first part is divided into two sections; section one was described the mothers’ demographic
characteristics, while the second section was for identifying the demographical characteristics of cerebral palsy
children. Th