Preferred Language
Articles
/
3BYIF4gBVTCNdQwCG3Ox
The Detection Limit of PCR Amplification for Cryptosporidium spp. Oocysts in Fecal Samples
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Feb 13 2024
Journal Name
The International Journal Of Oral & Maxillofacial Implants
The Accuracy of Intraoral Registration for Dynamic Surgical Navigation in the Edentulous Maxilla
...Show More Authors

Purpose: Despite the high clinical accuracy of dynamic navigation, inherent sources of error exist. The purpose of this study was to improve the accuracy of dynamic navigated surgical procedures in the edentulous maxilla by identifying the optimal configuration of intra-oral points that results in the lowest possible registration error for direct clinical implementation. Materials and methods: Six different 4-area configurations were tested by 3 operators against positive and negative controls (8-areas and 3-areas, respectively) using a skull model. The two dynamic navigation systems (X-Guide® and NaviDent®) and the two registration methods (bone surface tracing and fiducial markers) produced four registration groups. The accuracy of the

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
Almzna given in the consolation of the Prophet)) for women- an objective stu
...Show More Authors

 My research deals with the positions that the Prophet (PBUH) distressed. And condolences to those who lost her father and other problems and calamities that impede the life of women, has been given to the Lord of men, and good qualities, to strike the nation's finest proverbs in ensuring lost and lost of women and children, to be shown to us humanity in its finest form, and the best analyzed, and I hope God help And guidance and Rashad

View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Difficulties toward third level students in the department of Arabic language for both Education for Women College and Ibn Rushd/University of Baghdad for the studying of Arabic language curriculum: Difficulties toward third level students in the department of Arabic language for both Education for Women College and Ibn Rushd/University of Baghdad for the studying of Arabic language curriculum
...Show More Authors

Abstract
The curriculum is amodern science which reflects the social philosophy and
what it needs . It searches for amothod that limits the knowledge that the
indiridual gets in the society and the sorts of the culture that suits the enrironment
in which they live. It also clears for them their history and their great in heritance.
It has a great in flunce in their mental growth ,and it teacher the students new
roles in the thin king ,and training then on what they have learned . According to
there points the problem concentrats on the mostimpotant difficulties which facer
thestudents in studing Arabic langnage text-books
In spite of the great care that the text taker but it is full of subjects and studies
w

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 26 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Cost and Quality of Documentary Credit in achieving the Competitive Advantage in Banks: An Applied Research in North Bank for Finance and Investment and The United Bank for Investment
...Show More Authors

Documentary Credit passes through many practical phases starting from Opening credit and matching documents and payment of the amount of credit……etc.  It is worthy to mention that there are several aspects that are varied and differed from Bank to another one which can offer Competitive Advantage for the bank …This will be shown in this research.

For the purpose of achieving the objective of this research within the theoretical aspect, the researcher had seen and briefed several books and researches which are mainly related to the subject of the research.

As for the practical aspect, has included Questionnaire which included many questions that are fit and suitable to the hypotheses.

Research sample has

... Show More
View Publication Preview PDF
Publication Date
Wed May 28 2025
Journal Name
Retos
The effect of exercises in the third intensity zone of the strength characteristic of speed for the legs on some physiological and biochemical indicators for handball players
...Show More Authors

Objective: preparing exercises for the third intensity zone for strength and speed for the legs, and identifying their effect on some physiological and biochemical indicators for (the level of lactic acid concentration, the concentration of sodium bicarbonate, the concentration level of (potassium K+) and (sodium Na+) in the blood, and the number of breathing times (RF) Research methodology: the experimental research method was adopted by designing the experimental and control groups on a sample of Army Sports Club players amounting to (16) players, deliberately selected (100%) from their community using a comprehensive enumeration method, and then divided into two groups of equal number, After determining the tests for physiologica

... Show More
View Publication
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
The signification levels of scenery in the Iraqi theatrical show (the play of alubah for example)
...Show More Authors

Signification with its different aspects constitutes various aesthetic pictures for human and nature creations over different periods of time. It was a focal around which logical thinking loops on the interpretation level of the signification movement according to its structural context expresses its hidden entities with which a human being deals according to two symmetrical levels while interpreting to attain meaning. Sense was the first passing window for the picture of signification which thought deals with. While trying to decode it and because art in general and theatre in particular are considered as the basis of creating signification through its visual and aural elements, so it was necessary to consider one of the elements of cre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref