Preferred Language
Articles
/
4BixdZQBVTCNdQwCjRhW
Photodetector based on Rutile and Anatase TiO<sub>2</sub> nanostructures/n-Si Heterojunction
...Show More Authors

Photodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction

Publication Date
Mon Jan 01 2018
Journal Name
Https://medwelljournals.com/journalhome.php?jid=1816-949x
Some generalized n-tuplet coincidence point theorems for nonlinear contraction mappings
...Show More Authors

Scopus (12)
Scopus
Publication Date
Thu Jul 01 2010
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SEDIMENTO LOGICAL STUDY OF SHIRANISH FORMATION WELL DD-1 (N-IRAQ)
...Show More Authors

Shiranish formation has been divided into two microfacies units: 1-Marly biowacke stone facies 2-Biogenic pack stone facies These microfacies reflected marine deep shelf margin in the upper part of the formation, the lower part was deeper. 238 slides were investigated depending on Mineralogical, compositional and Biological processes, which reflect deep shelf margin at upper part of the formation, but at the lower part open sea environment. The age of the formation is estimated depending on the recognized biostratigraphic zone using the index fossils to be Upper- Middle Maestrichtian.

View Publication Preview PDF
Publication Date
Wed May 14 2025
Journal Name
Al–bahith Al–a'alami
New Recent Trends in Agenda Setting Studies n The Arab World
...Show More Authors

This study aims to examine the main features of the new trends in agenda studies using the secondary analytic approach in analyzing the newest studies in agenda-setting issues from 2007 till 2017, in addition to the quantitative approach.
The researcher has analyzed 110 studies -75 foreign and 35 Arabic - to determine, describe and evaluate the key research trends which came in Arabic and foreign agenda-setting studies. The results confirmed that studies of the agenda theory are increasing steadily worldwide with diversity in the theoretical trends and used research tools. In addition, primary studies focus on content analysis and the survey approach (method). Also, most Arabic agenda-setting studies used the traditional methods and k

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Karbala Journal Of Medicine
Assessment Of Her-2/Neu Gene Amplification Status by Chromogenic in Situ Hybridization in Breast Cancer Patients with Equivocal 2+ Her-2/Neu Immunostaining and Its Relation to The Clinic Pathological Parameters
...Show More Authors

background: human epidermal growth factor receptor-2 (her2/neu) is related to growth factor receptors with alkaline kinase activity and it is regarded as important prognostic and therapeutic factor that can depended on in breast cancer therapy. HER2/neu expression by immunohistochemistry (IHC) is submitted to a great in terob server inconsistency. Subsequently additional confirmatory tests for assessment of gene alterations and amplification status are needed for patients with early or metastatic breast cancer. In situ hybridization techniques and specifically Chromogenic in situ hybridization (CISH) was arise as a practical, cost-effective, and alternative to fluorescent in situ hybridization in testing for gene alterationAims of the study

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
SARS-CoV-2 and other Coronaviruses: A matter of variations
...Show More Authors

Since the appearance of COVID-19 disease as an epidemic and pandemic disease, many studies are performed to uncover the genetic nature of the newly discovered coronavirus with unique clinical features. The last three human coronavirus outbreaks, SARS-CoV, MERS-CoV and SARS-CoV-2 are caused by Beta-Coronaviruses. Horizontal genetic materials transfer was proven from one coronavirus to the other coronavirus of non-human origin like infectious bronchitis virus (IBV) of avian. Horizontal genetic materials transfer was also from non-corona viruses like astroviruses and equine rhinovirus (ERV-2) or from coronavirus-unrelated viruses, like influenza virus type C. However, SARS-CoV-2 is identical to SARS-CoV and MERS-CoV. Interestingly, Wuhan ci

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Tue Apr 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Weak Pseudo – 2 – Absorbing Submodules And Related Concepts
...Show More Authors

      Let  R  be a commutative ring  with identity  and  E  be a unitary left  R – module .We introduce  and study the concept Weak Pseudo – 2 – Absorbing submodules as  generalization of weakle – 2 – Absorbing submodules , where a proper submodule  A of  an  R – module  E is  called  Weak Pseudo – 2 – Absorbing  if   0 ≠ rsx   A   for  r, s  R , x  E , implies that  rx   A + soc ( E ) or  sx  A + soc (E)  or   rs  [ A + soc ( E ) E ]. Many basic  properties, char

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 14 2011
Journal Name
Journal Of Education
Synthesis and Characterization Complexes of 2- Thiotolylurea with Matel Salts.
...Show More Authors

Complexes of some metal ions with 2-thiotolylurea were prepared in ethanolic medium using (1:1) (Metal : Ligand) ratio yielded series of neutral complexes as the general formula [M(L)Cl2]. The prepared complexes were identified by atomic absorption FT.IR, UV-Visble spectra, molar conductivity and magnetic properties. From the above data the tetrahedral structure was suggested for all complexes.

Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation Pore and Fracture Pressure Based on Log Data; Case Study: Mishrif Formation/Buzurgan Oilfield at Iraq
...Show More Authors

Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr

... Show More
Crossref
Publication Date
Fri Jul 30 2021
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
EEG Motor-Imagery BCI System Based on Maximum Overlap Discrete Wavelet Transform (MODWT) and Machine learning algorithm
...Show More Authors

The ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (13)
Crossref (5)
Scopus Crossref