Preferred Language
Articles
/
6Bj-4pgBVTCNdQwCTsE_
Shell model and Hartree-Fock calculations of longitudinal and transverse electroexcitation of positive and negative parity states in <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"><mml:mmultiscripts><mml:mi mathvariant="normal">O</mml:mi><mml:mprescripts/><mml:none/><mml:mn>17</mml:mn></mml:mmultiscripts></mml:math>
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Studying the Effect of Curcumin (Standard & Supplements) and Zinc on the Concentrations of Glucose, Insulin, HOMA-IR, and Anti-Mullerian Hormone in PCOS-Model Rats
...Show More Authors

The goal of the current study was to investigate the effects of curcumin in both formulas (supplement and standard), zinc, and then use them together to show their effect on the levels of glucose, insulin, insulin resistance (IR), and anti-mullerian hormone (AMH) in the model of female rats with induced polycystic ovary syndrome (PCOS) using 1mg/kg/day of letrozole for 21 days followed by a treatment period of 14 days including different treatments of zinc 30 mg/kg, curcumin standard 200 mg/kg, curcumin supplement 200 mg/kg, (curcumin standard plus zinc), (curcumin Supplement plus zinc) and metformin as a standard treatment. After the treatment, all female rats were sacrificed, and blood samples were collected from the inferior vena cava

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
Stellar Thermonuclear Reaction Rates of Proton Radiative Capture by Closed Light Shell Isotopes
...Show More Authors

Light isotopes, especially closed shell nuclei, have significance in thermonuclear reactions of the Carbon-Nitrogen-Oxygen (CNO) cycle in stars. In this research, 12C(p, γ) 13N and 14N(p, γ) 15O reactions have been calculated by means of Matlab codes to find the reaction rate across a temperature range of 0.006 to 10 GK using non-resonant parts, as well as the astrophysical S- factor S(E) at low energies. It was concluded that the high binding energy of 12C and 14N nuclei make the reaction less probable thus enabling other competitive processes to develop, which enhances the probability of other competitive proton reactions in the CNO cycle.

View Publication
Scopus Crossref
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Photographic Analysis of Macro- Aand Micro-Aesthetic Appearance in a Sample of Iraqi Adults With Class I Normal Occlusion
...Show More Authors

ABSTRACT Background: Generally, the facial esthetics depends on the esthetic appearance of the maxillary anterior teeth. The purposes of this study were to analyse the macro-aesthetic appearance of the face and the micro-aesthetic appearance of the maxillary anterior teeth to establish the normative values for class I normal occlusion and to detect possible gender differences. Materials and methods: The sample consisted of 120 Iraqi adults (60 males and 60 females) aged (18-23) years. Each individual was clinically examined, then with cephalostat based head position, extraoral and intraoral photographs were taken for each subject. The facial and dental measurements were measured using AutoCad program 2014. Descriptive statistics was obtaine

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Russian-American competition in the Middle East:Power and roles conflict: Syria as a model
...Show More Authors

Because of its importance in the world, Middle East area is one of the competition areas between the major and great powers. Among those powers are Russia and United states of America. The competition between these two powers to control Syria is greatly clear since 2011. It is also one of the most important subject in the international politics. This importance comes from the importance of Russia and the United States of America besides importance of the Middle East. At the end of the cold war, United States of America maintained its role in the international system and became the only pole that dominated the international affairs while Russia tried to overcome the challenges inherited from the former Soviet Union, and it succeeded in th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
Populism in the Palestinian political discourse The Fatah and Hamas movements are a model
...Show More Authors

Receipt Date:10/11/2021 Acceptance Date:29/12/2021 Publication Date:31/12/2021

Creative Commons LicenseThis work is licensed under a Creative Commons Attribution 4.0 International License.

The study aimed to clarify the conceptual explanations and the theoretical rooting of the concept of the populist phenomenon. And explore the political and cultural implications and connotations contained in populist political discourse. And to stand on the foundations and meanings on w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
A Note on the Hierarchical Model and Power Prior Distribution in Bayesian Quantile Regression
...Show More Authors

  In this paper, we investigate the connection between the hierarchical models and the power prior distribution in quantile regression (QReg). Under specific quantile, we develop an expression for the power parameter ( ) to calibrate the power prior distribution for quantile regression to a corresponding hierarchical model. In addition, we estimate the relation between the  and the quantile level via hierarchical model. Our proposed methodology is illustrated with real data example.

View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
meta and its dimensions in the designed bio-formation - virtual reality environment - a model
...Show More Authors

This study revolves around the rapid changes of science and a comparison of the formal and practical aspects and the reason behind summoning the changes and their types, which are subject to the influence of the recipient. This transformation represents formal and intellectual production cycles and formal functional generation that is subject to the goals of the system of multiple differences at the level of time and place. It meets the needs and the request for change, but access to it comes through multiple systems and portals that are different from the normal and the usual, so this study was called (meta and its dimensions in the designed biological formation (virtual reality environment - a model). The research seeks to find solutio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
Iranian Journal Of Science
Exploring Neimark-Sacker Bifurcation and Chaos Control in a Tri-species Discrete-Time Model
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref