Preferred Language
Articles
/
1RYG6IoBVTCNdQwCQafM
Chloroviruses Lure Hosts through Long-Distance Chemical Signaling

Viruses have not previously been reported to act as chemotactic/chemoattractive agents. Rather, viruses as extracellular entities are generally viewed as non-metabolically active spore-like agents that await further infection events upon collision with appropriate host cells. That a virus might actively contribute to its fate via chemotaxis and change the behavior of an organism independent of infection is unprecedented.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon May 15 2023
Journal Name
Iraqi Journal Of Science
Delineation of Quaternary Aquifers by Using Long 2D Imaging in Southern Al-Shihaby Area (Wasit Governorate), Eastern Iraq

An electrical survey was carried out by using 2D imaging technique at (15)
station. The study area is located southern Al-Shihaby area, south-east of Wasit
governorate, Eastern Iraq. The numbers of the employed electrodes were (120) and
the (a) spacing equal to (10m), and the total length of survey line is (1200m). The
inverse models of 2D imaging showed one Quaternary aquifer located in the
Quaternary deposits which comprises in alluvial fan and wind deposits of
(Pleistocene – Holocene) ages. Layers of aquifer consist of gravel and sand with
little silt. Low resistivity values reflected the presence of clay layers, and increasing
salinity of water gradually with the depth. The aquifer occurs at minimum depth

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of long-term investment on bank profitability : an applied research on a sample of Iraqi banks

Abstract

                The aim of the research is to demonstrate the impact of long-term investment on profitability, and in order to achieve this goal, long-term investment was chosen, represented by (the ratio of long-term investments to total investments, the ratio of long-term investment to the total (deposits) as independent variables, and studying its impact on the dependent variable, which is profitability as measured by the rate of return on investments, the rate of return on equity. In order to reach the results, the inductive approach and the analytical descriptive approach were used, and the research found a significant impac

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2008
Journal Name
Journal Of Engineering
Publication Date
Sat Jan 01 2022
Journal Name
Geotechnical Engineering And Sustainable Construction
Crossref
View Publication
Publication Date
Thu Jun 25 2020
Journal Name
Aip Conference Proceedings
Publication Date
Sun May 01 2022
Journal Name
Rimak International Journal Of Humanities And Social Sciences
BUILDING THE MEDIA MESSAGE AND DESIGNING IT THROUGH INFOGRAPHICS

The study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the

... Show More
Crossref
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Mining Deviations in Document Writing Style through Vector Dissimilarity

     Doubts arise about the originality of a document when noticing a change in its writing style. This evidence to plagiarism has made the intrinsic approach for detecting plagiarism uncover the plagiarized passages through the analysis of the writing style for the suspicious document where a reference corpus to compare with is absent.      The proposed work aims at discovering the deviations in document writing style through applying several steps: Firstly, the entire document is segmented into disjointed segments wherein each corresponds to a paragraph in the original document. For the entire document and for each segment, center vectors comprising average  weight of their word  are constructed. Second, the degree of cl

... Show More
Scopus Crossref
View Publication
Publication Date
Tue Dec 15 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Satellite Images Fusion Using Mapped Wavelet Transform Through PCA

In this paper a new fusion method is proposed to fuse multiple satellite images that are acquired through different electromagnetic spectrum ranges to produce a single gray scale image. The proposed method based on desecrate wavelet transform using pyramid and packet bases, the fusion process preformed using two different fusion rules, where the low frequency part is remapped through the use of PCA analysis basing on covariance matrix and correlation matrix, and the high frequency part is fused using different fusion rules (adding, selecting the higher, replacement), then the restored image is obtained by applying the inverse desecrate wavelet transform. The experimental results show the validity of the proposed fusion method to fuse suc

... Show More
View Publication Preview PDF