Diyala Governorate was exposed recently to high flood waves discharged from Hemrin Dam to Diyala River when the dam reached its full capacity. The recently recorded discharge capacity of Diyala River was reduced to just 750m3/s. This exposes cities and villages along the Diyala River to flood risk when discharging the flood waves, which may reach 3000 m3/s. It is important to manage, suggest, and design flood escapes to discharge the flood waves from Hemrin Dam away from Diyala River. This escape branches from Hemrin Lake towards Ashweicha Marsh. One dimensional hydraulic model was developed to simulate the flow within the escape by using HEC-RAS software. Eighty-two cross-sections were extracted from the digital elevation model for the escape and used as geometric data. Moreover, thirty cross-sections for the Diyala River were utilized from the Strategic Study for Water and Land Resources in Iraq. Since the escape passes through two regions of different geological formations, two roughness coefficients of 0.035and0.028were used. Two discharge cases were applied3000m3/s, which is the 500 years return period extreme hydrograph of Hemrin Dam, and 4000 m3/s, which is the design discharge of Hemrin Dam spillway. A spillway was proposed at the escape entrance with crest level 105m.a.m.s.l., followed by a drop structure with eighteen rectangular steps
The research deals with metaphors as being one of the primary means used by Lyudmila Ulitskaya when writing the novel " Sincerely Yours Shurik ", to form diverse and multifaceted collective female images of representatives of the classic psychological patterns presented in the work. This research reflects the results of the study related to the work of Lyudmila Yevkinevna Ulitskaya, an actress of modern Russian prose. The novel "The Sincerely to You Shorek" is one of Ludmila Ulitskaya's creations (the year of writing - 2003), which, like her other works, is distinguished by a unique presentation style, rich vocabulary, lexical and semantic diversity, and a special style of writing. writer. The main objective of the research is to look at th
... Show MoreThe aim of the current study is to identify the effectiveness of cognitive conflict strategy in comprehending reading among literary fifth students in literature and literature texts. The researcher uses experimental method with partial control. The sample consisted of (80) students distributed into control and experimental groups. The scientific material, the behavioral goals, the teaching plans, and the instrument of the research have been prepared (reading comprehension test) by the researcher.
The instrument's validity and reliability have been calculated and then applied to the sample. After treating the data statistically by using SPSS, the results have revealed that there is a statistically significant difference at the si
... Show MoreThe article is devoted to the Russian-Arabic translation, a particular theory of which has not been developed in domestic translation studies to the extent that the mechanisms of translation from and into European languages are described. In this regard, as well as with the growing volumes of Russian-Arabic translation, the issues of this private theory of translation require significant additions and new approaches. The authors set the task of determining the means of translation (cognitive and mental operations and language transformations) that contribute to the achievement of the most equivalent correspondences of such typologically different languages as Russian and Arabic. The work summarizes and analyzes the accumulated exper
... Show MoreAbstract
The open budget means everyone in the society can get information about the government budget in order to watch the governmental works. The aim of the research is to study the concepts of open budget, its advantage, limitations, role of supporting the transparency and questioning the administrative and financial corruption. Thus reflects positively on the national economy by providing governmental information to all users whether they are individuals or belong to the political class, or any other governmental or nongovernmental organizations which are interested in these information.
In order to achieve the objectives of the research aims, we make questionnaire to see aca
... Show MoreAbstract:
The tax is one of the elements of the general revenues of the state and contributes to covering its expenses. Taxes are imposed in most countries of the world. The tax proceeds depend on a set of factors that contribute either positively or negatively to the tax share by increasing or decreasing it. Therefore, the research aims to demonstrate the role of the tax examiner's procedures in achieving the validity of the taxable base and its reflection on the tax proceeds, as well as reviewing the tax examiner's procedures related to the tax return process. Examination and tax audit of the financial statements, as well as presenting the financial statements to an independent and i
... Show MoreThe research studied and analyzed the hybrid parallel-series systems of asymmetrical components by applying different experiments of simulations used to estimate the reliability function of those systems through the use of the maximum likelihood method as well as the Bayes standard method via both symmetrical and asymmetrical loss functions following Rayleigh distribution and Informative Prior distribution. The simulation experiments included different sizes of samples and default parameters which were then compared with one another depending on Square Error averages. Following that was the application of Bayes standard method by the Entropy Loss function that proved successful throughout the experimental side in finding the reliability fun
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
In this research want to make analysis for some indicators and it's classifications that related with the teaching process and the scientific level for graduate studies in the university by using analysis of variance for ranked data for repeated measurements instead of the ordinary analysis of variance . We reach many conclusions for the
important classifications for each indicator that has affected on the teaching process. &nb
... Show MoreAutorías: Muayad Kadhim Raheem, Lina Fouad Jawad. Localización: Opción: Revista de Ciencias Humanas y Sociales. Nº. 21, 2019. Artículo de Revista en Dialnet.