The general assumption of linear variation of earth pressures with depth on retaining structures is still controversial; investigations are yet required to determine those distributions of the passive earth pressure (PEP) accurately and deduce the corresponding centroid location. In particular, for rigid retaining walls, the calculation of PEP is strongly dependent on the type of wall movement. This paper presents a numerical analysis for studying the influence of wall movement on the PEP distribution on a rigid retaining wall and the passive earth thrust location. The numerical predictions are remarkably similar to existing experimental works as recorded on scaled test models and full-scale retaining walls. It is observed that the PEP varies linearly with depth for the horizontal translation, but it is nonlinear when the movement is rotational about the top of the retaining wall. When rotation is around the top of the wall, the resultant of PEP is located at a depth that varies between 0.164 and 0.259
A collection of pictures of traditional Kurdish women's national clothing and contemporary clothing was collected. A visit was also made to the city of Sulaymaniyah and the city of Halabja to find out the foundations of traditional clothing for the Kurdish regions and the impact of contemporary fashion on traditional dress. Which represents the culture and regionalism and reflects the picturesque nature of northern Iraq, and in order to complete the study, the parametric measurements of the clothes were analyzed and the graphs of the dress and its accessories were re-drawn to understand and make a comparison between them to study the clear influences and changes and examine the possibility of benefiting from them in sewing contemporary f
... Show MoreAbstract
The research aims to determine the impact of the strategy performance evaluation and of the Standards (leadership, people, knowledge, processes, financial) in the achievement of organizational effectiveness in accordance with the dimensions (planning and setting goals, Exploitation of the Environment, achieve the goals, the ability to adapt, information management and communications) and the relationship between them, the problem of the research in the growing interest in the process of performance evaluation for organizations, the erroneous belief that the performance evaluation activity is useful, and the fact that performance evaluation process is one of the main tasks of the work of the Office of the Inspecto
... Show MoreReliable estimation of critical parameters such as hydrocarbon pore volume, water saturation, and recovery factor are essential for accurate reserve assessment. The inherent uncertainties associated with these parameters encompass a reasonable range of estimated recoverable volumes for single accumulations or projects. Incorporating this uncertainty range allows for a comprehensive understanding of potential outcomes and associated risks. In this study, we focus on the oil field located in the northern part of Iraq and employ a Monte Carlo based petrophysical uncertainty modeling approach. This method systematically considers various sources of error and utilizes effective interpretation techniques. Leveraging the current state of a
... Show MoreThis study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreSuccessive waves and generations of terrorists attacked the Iraqis in the years following the fall of the regime in Iraq in 2003, after the US invasion of the country under the pretext of weapons of mass destruction. Hence, the Iraqi people enrolled in ongoing war with these armed groups which led to massive casualties due to blasts and missile injuries.
Mechanism of blasts injury can be classified into primary, secondary, tertiary, and quaternary. While bullet injuries can be classified into low and high-energy injuries, the type and severity of the injury will influence the type of management, together with facilities available in
Coronavirus: (COVID-19) is a recently discovered viral disease caused by a new strain of coronavirus.
The majority of patients with corona-virus infections will have a mild-moderate respiratory disease that recovers without special care. Most often, the elderly, and others with chronic medical conditions such as asthma, coronary disease, respiratory illness, and malignancy are seriously ill.
COVID-19 is spread mostly by salivary droplets or nasal secretions when an infected person coughs or sneezes.
COVID-19 causes severe acute respiratory illness (SARS-COV-2). The first incidence was recorded in Wuhan, China, in 2019. Since then it spreads leading to a pandemic.
... Show MoreThis study investigates the influence of Strategic Consensus (SC) on Organizational Performance (OP), with Strategic Alignment (SA) serving as a mediating variable, within private academic institutions in Iraq. The research utilized scales developed to measure each variable: SC, OP, and SA, all of which are unidimensional. The sample comprised 131 senior participants, including deans and faculty council members, with questionnaires distributed across three institutions: Dijla University College (35 respondents), Baghdad College of Economic Sciences (31 respondents), and the University of Uruk (65 respondents). Data analysis employed various statistical techniques, including normality testing, confirmatory factor analysis, descriptive statis
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe research aims to demonstrate the impact of governance mechanisms on the quality of financial reports in the light of the accounting disclosure for sustainable development represented in (accounting disclosure for economic development, accounting disclosure for environmental development, and accounting disclosure for social development) in a sample of banks listed in the Iraq Stock Exchange.
Governance mechanisms were measured by evaluating and analyzing the mechanisms in banks for the research sample consisting of (15) banks, based on the governance guide issued by the Central Bank, as well as the banks’ financial reports for the years 2016 -2018, and the dimensions of accounting disclosure for sust
... Show More