Preferred Language
Articles
/
1hfxjZEBVTCNdQwCyZWx
REVISION OF THE GENUS XYLOCOPA LATREILLE, 1802 (HYMENOPTERA, APIDAE) WITH A NEW RECORD OF SPECIES IN IRAQ
...Show More Authors

In this study, the genus Xylocopa Latreille, 1802 (Hymenoptera: Apidae) was revised. There were 4 species registered in our investigations: X. hottentotta Smith, 1854; X. olivieri Lepeletier, 1841; X. pubescens Spinola, 1838 and X. valga Gerstäcker, 1872, the first species was described as being found for the first time for the insect fauna of Iraq, which were obtained from Solanum melogena L. flowers. Key to the species was constructed and supported by figures of the main diagnostic characters and some morphological features, illustrated and compared with other species, which are recorded in the current survey.

Scopus Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
2018 2nd International Conference For Engineering, Technology And Sciences Of Al-kitab (icets)
Good governance of service quality through the adoption of sustainable energy the study of A1- Karkh historic center of in Baghdad city
...Show More Authors

Good governance of service quality through the adoption of sustainable energy the study of A1- Karkh historic center of in Baghdad city

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
In Vitro Comparative Assessment Of The Effect Of Gutta-Fusion Obturation On The Push Out Bond Strenght Of Three Types Of Sealers
...Show More Authors

Background: The bond strength of the root canal sealers to dentin is very important property for maintaining the integrity and the seal of root canal filling. The aim of this study was to evaluate and compare the push-out bond strength of root filled with total fill Bioceramic, AH Plus and Gutta-flow®2 sealers using GuttaFusion®obturation system versus single cone obturation technique. Materials and method: sixty of mandibular premolars teeth with straight roots were used in this study, these roots were instrumented using Reciproc system, instrumentation were done with copious irrigation of 3 mL 5.25% sodium hypochlorite solution (NaOCl) during all the steps of preparation, and smear layer will be removed with 1 ml of 17% EDTA kept in

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluating the extent of the response of the tax administration leaders towards the concept of the strategic lens and its relationship to tax pioneer performance: Applied Research in the General Authority for taxes
...Show More Authors

The aim of the research is to evaluate the response of the researched leaders towards practicing the concept of the lens, which is its dimensions with (stakeholders, resource mobilization, knowledge development, culture management) and the nature of its relationship to tax pioneer performance represented in its dimensions (strategic direction, leadership indicators, growth, renewal and modernization, efficiency, Effectiveness) The questionnaire was approved as a main tool in collecting data and information from the sample members in the General Authority of Taxes, which number (91) Who are on (M. General Manager, Division Director, Deputy Director, Senior Division Director, Deputy Director, Second Division, Division Officer, M. D

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 12 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Are Newly Graduated Pharmacists Competent to Perform Adequately in Hospitals? A Qualitative Study
...Show More Authors

Objectives: To assess the qualifications and performance of newly graduated pharmacists and explore factors that affect their performance in public hospitals. Methods: This qualitative study included face-to-face, semi-structured interviews with hospital practitioner pharmacists. It was conducted between March and May 2023 in Kerbala province, Iraq. The participating pharmacists were selected purposefully because they had three or more years of work experience at governmental hospitals. The audio-recording interviews were transcribed. Thematic analyses were used to generate themes and subthemes from the interviews. Results: Twenty-seven hospital pharmacists participated in this study. The study found that there are several factors t

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sat Jul 19 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Cranial base morphology in different skeletal classes (A cross-sectional lateral cephalometric study)
...Show More Authors

Background: It was stated in scientific literatures that the entire craniofacial complex is influenced by the growth of the cranial base structures. Nevertheless, many times this is not the case, and this point is subject to great controversy so the aim of this study is to evaluate the possible differences in cranial base shape and flexure between different skeletal classes for both genders and to investigate any possible correlation between cranial base variables and other skeletal base variables. Materials and Methods: The sample include 75 lateral cephalometric radiographs of Iraqi adults aged between 18-25 years (39 males, 36 females), collected from patients and undergraduate students in the orthodontic department of College of Dentist

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Theory And Practice In Language Studies
Constructing Carcinogen Risk in Scientific Discourse Through Ideological Conflict: A Cognitive Pragmatic Analysis
...Show More Authors

With the increasing rates of cancer worldwide, a great deal of scientific discourse is devoted to arguments and statements about cancer and its causes. Scientists from different fields try to seize any available chance to warn people of the risk of consuming and exposing to carcinogens that have, unfortunately, become essential parts of modern life. The present paper attempts to investigate the proximization strategy through which scientists construct carcinogen risk to enhance people’s preventive actions against these carcinogens. The paper targets the construction which depends on producing the conflict between the values of the people themselves and the contrasting values assigned to carcinogens. To achieve this aim, Cap’s (2

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Co – odd (even) Sum Degree Edge Domination Number in Graphs
...Show More Authors

 An edge dominating set    of a graph  is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number  is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G.  The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 07 2018
Journal Name
Al-kindy College Medical Journal
Risedronate as a therapeutic trial post-hysterectomy in premenopausal women to prevent osteoporosis
...Show More Authors

Background: Osteoporosis is a skeletal defect manifested by a reduction of bone strength as a result of reduced bone mass to the extent that there is a higher risk of fracture even on minor trauma. Hysterectomy in a premenopausal woman is a well known cause of ovarian failure resulting in an increased risk of osteoporosis.

Objective : To clarify bisphosphonate's preventive effect on osteopenia and osteoporosis in premenopausal women after hysterectomy.

Type of the study: Cross –sectional study.

Method:  84 premenopausal females post hysterectomy aged between 40 – 50 years, were enrolled in this randomized controlled double blinded trail a

... Show More
View Publication Preview PDF
Crossref