Preferred Language
Articles
/
2heCbI4BVTCNdQwC7Udi
The removal of Pb(II) ions from aqueous solutions by immobilized (Chlorophyta) macroalgae: an equilibrium, kinetic, and desorption-regeneration study
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of artificial intelligence in achieving Customer satisfaction and its reflection on cost accounting: An applied research in the Iraqi electronic industries company
...Show More Authors

Based economic units to technology to add innovations that lead to contribute to customer satisfaction, under intense competition and rapid development in customer taste, the economic units tend to apply the concepts that contribute to customer satisfaction led by the introduction of artificial intelligence techniques. In the production prominent role in the contributing and responding to the rapid changes in customer tastes, and consequent impact this in achieving customer satisfaction. Search gained importance of relying on artificial intelligence techniques to achieve customer satisfaction through speed of response to changes in the tastes of customers and thus be able to increase its market share، and sales growth، and to achieve a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Hair Is An Indicator Oe Human Pollutants With The Toxic Substances
...Show More Authors

Hair is an excellent indicator for abnormal concentration of toxic elements , In this study a random samples from girls hair of 12 cm long were irradiated by a flux of neutrons (4x10^ n/ cm^.s) obtained from an Am-Be neutron source of 5-Ci activitity . The y-ray activity measurements were carried out by using a " 5x5 " well- type Nal (Tl) detector. The study indicates clearly that the maximum concentration of elements was at about 7 cm hair length.

View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Res Militaris
Building the proposed Fama and French Six-Factor Model FF6M-DLE by adding the indebtedness factor and its reflection on the fair value of common stock
...Show More Authors

The research aims to determine the required rate of return according to the Fama and French five-factor model, after strengthening it by adding the indebtedness factor to build the Fama and French six-factor model FF6M-DLE. The effect of the indebtedness factor on the company's profitability and the real value of the ordinary shares calculated according to the (equivalent ascertainment) model and its suitability with the company's situation, and an analysis of the fluctuation between the market value and the real value of the ordinary stocks.

Scopus
Publication Date
Thu Feb 05 2026
Journal Name
Journal Of Baghdad College Of Dentistry
An Immunohistochemical Expressions of BAD, MDM2, and P21 in Oral Squamous Cell Carcinoma
...Show More Authors

Background: Oral squamous cell carcinoma (OSCC) is a common malignancy characterized by poor prognosis and low survival rate. The purpose of this study was to evaluate the Immunohistochemical expressions of BAD, MDM2, and P21as apoptotic markers in oral squamous cell carcinoma. Materials and methods: This study was performed on forty formalin-fixed paraffin-embedded blocks which histopathologically diagnosed as Oral Squamous Cell Carcinoma. All cases were collected from the Histopathological Laboratory from patients treated surgically at Maxillofacial surgery Department at Ramadi Teaching Hospital, Iraq. Results: The immunohistochemical staining of BAD showed positive expression in 39 (97.5%), MDM2 showed positive expression in 39(97.5%)

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
An Investigation of Corona Domination Number for Some Special Graphs and Jahangir Graph
...Show More Authors

In this work,  the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Sep 14 2015
Journal Name
Day 2 Tue, September 15, 2015
Modeling and History Matching of a Fractured Reservoir in an Iraqi Oil Field
...Show More Authors
Abstract<p>In recent years the interest in fractured reservoirs has grown. The awareness has increased analysis of the role played by fractures in petroleum reservoir production and recovery. Since most Iraqi reservoirs are fractured carbonate rocks. Much effort was devoted to well modeling of fractured reservoirs and the impacts on production. However, turning that modeling into field development decisions goes through reservoir simulation. Therefore accurate modeling is required for more viable economic decision. Iraqi mature field being used as our case study. The key point for developing the mature field is approving the reservoir model that going to be used for future predictions. This can </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
Prevalence of bacterial infection and their sensitivity in patients undergoing an infertility eval
...Show More Authors

Background: Infection with sexually
transmitted diseases is broad and includes
bacterial, viral and protozoa infection.
Large number of infected people goes
untreated because of symptomatic or
unrecognized infections.
Patients and methods: Forty five
patients was complaining from infertility
(primary or secondary), consulting
Kammal El-Sammari Hospital for
infertility from May - 2008 to February -
2009. Control group consisted of twenty
fertile women that consulting private clinic
for checking. Four swabs were taken from
each woman in two groups. Two swabs
were taken from posterior fornix of the
vagina (High vaginal swab) and the last
two were taken from endocervical canal.
First swab

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 02 2008
Journal Name
Iraqi Postgraduate Medical Journal
[PDF] from iasj.net Isolation of tRNA From Uropathogenic Escherichia Coli
...Show More Authors

Thirty uropathogenic E. coli isolates were isolated from hospitalized and non hospitalized patients, complaining of urinary tract infections, of Al-Kadhymia Teaching Hospital and subjected to tRNA extraction. A method of tRNA extraction was modified by adding sodium dodecyl sulfate (SDS) instead of urea. Polyacrylamide gel electrophoresis and two methods of staining, ethidium bromide staining and silver staining, as well as spectrophotometric detection were used.

Publication Date
Sun Dec 30 2018
Journal Name
دراسات في التاريخ والاثار
unpublished cuneiform texts from the Iraqi Museum (confiscation)
...Show More Authors

The research included studying a group of eight cuneiform texts dating back to the Old Babylonian era, specifically to the reign of King Larsa Rim-Sin, which were identified through studying the historical versions of these texts. These texts are confiscated, i.e. texts of unknown location, because they did not come through excavations, but rather came to the Iraqi Museum either by people who obtained them through digging, or stolen and smuggled texts that are retrieved by the General Authority for Antiquities; as is the case with our texts that were found smuggled to Jordan and were retrieved by the General Authority for Antiquities.