Preferred Language
Articles
/
0hY6dIcBVTCNdQwC-EvV
Using remote sensing techniques to monitoring and evaluate the water cover in AL_Razzaza lake: Iraq at deferent periods
...Show More Authors

Multi-spectral satellite images of the Landsat satellite by the tow sensitive Thematic Mapper (TM) and Thematic Mapper Enhancement (ETM+), which covered the study area located south east of Iraq. In this research; used the sixth thermal spectral band (Thermal Band) for study the water cover in the AlRazzaza Lake located within the province of Karbala. We intended to study the cover a case of the study area, used satellite images showing the status of region during the period from 1990 to 2001 and 2007. From this study we conclude that cover the water of the study area change in sequence case to decrease during these years.

View Publication
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
Positive thinking and its relationship to academic achievement in art history
...Show More Authors

This study was conducted for the purpose of exploring the relationship between positive thinking and academic achievement in art history. And it relates to the student’s personality, intelligence, abilities and economic and social level. The sample of the study consisted of (40) male and female students from the first stage students - Department of Art Education in the Faculty of Fine Arts / Morning Study, A positive thinking questionnaire was applied to them, and the study found that there is no positive relationship between positive thinking and academic achievement in art history.   

View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of The College Of Education For Women
Shyness in Female College Students And its relation to some Variables
...Show More Authors

The human being is a social being and human communication is a fundamental axis in the process of social interaction, and the characteristic of social shyness grows through the interaction of the individual with his environment. Identifying the level of shyness among university students, and identifying the differences in shyness among university students according to specialization (scientific, humanities). In order to achieve the objectives of the research, the researcher prepared a measure of shyness based on Zimbardo's theory, and the components that he identified are the (behavioral, cognitive, and emotional components). The validity and reliability were calculated using the Cronbach's alpha method, reaching (0.94), and the scale in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Using Real-Time PCR to Investigate Some of Antibiotic Resistance Genes from Streptococcus agalactiae Isolates from ewe Mastitis cases in Nineveh province
...Show More Authors

In this study, from a total of 856 mastitis cases in lactating ewes, only 34 Streptococcus agalactiae isolates showed various types of resistance to three types of antibiotics (Penicillin, Erythromycin and Tetracycline). St. agalactiae isolates were identified according to the standard methods, including a new suggested technique called specific Chromogenic agar. It was found that antibiotic bacterial resistance was clearly identified by using MIC-microplate assay (dilution method). Also, by real-time PCR technique, it was determined that there were three antibiotics genes resistance ( pbp2b, tetO and mefA ). The high percentage of isolate carried of a single gene which was the Tetracycline (20.59%) followed by percentage Penicillin was

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jul 24 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
The Incidence of Hepatitis C Virus Infections among People Screened in Governmental Health Care Facilities in 2018 in Iraq
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jul 24 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
The Incidence of Hepatitis C Virus Infections among People Screened in Governmental Health Care Facilities in 2018 in Iraq
...Show More Authors

View Publication
Crossref
Publication Date
Thu Jun 29 2023
Journal Name
Farmacia
CORRELATION BETWEEN INTEGRIN ALPHA-4 GENE POLYMORPHISMS AND FAILURE TO RESPOND TO NATALIZUMAB THERAPY IN IRAQI MULTIPLE SCLEROSIS PATIENTS
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Physics And Chemistry Of Solids
Sensitization of TiO2 nanotube arrays photoelectrode via homogeneous distribution of CdSe nanoparticles by electrodeposition techniques
...Show More Authors

View Publication
Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Sep 15 2010
Journal Name
Journal Of Baghdad College Of Dentistry
Computerized measurement of bite forces for edentulous subjects with denture bases of different impression techniques
...Show More Authors

Background: Complete denture wearers show lower levels of bite force than dentate subjects. This has a significant influence on their chewing efficiency. In this study an attempt was made to investigate the effect of the impression technique on the maximum bite force in complete denture wearers. Materials and methods: The patients selected for this research were 12 edentulous patients. Three different techniques for registering the final impression were made; the mucostatic, mucofunctional, and the selective pressure impression technique. Two sets of upper and lower denture bases and one set of upper and lower dentures were constructed for each subject. Intraoral and extraoral instruments and devices, as well as a computer program were used

... Show More
Preview PDF