Preferred Language
Articles
/
7BaLuYsBVTCNdQwCN9fi
Detection Levels of Cytokines (IL-6 and IL-18) and Microbial Parameters in Patients with Renal Failure in Diyala Province
...Show More Authors

Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
A Magnetic Field Concentration Method for Magnetic Flux Leakage Detection of Rail-Top Surface Cracks
...Show More Authors

View Publication
Scopus (5)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Gene Reports
Hepatitis B virus genotypes among chronic hepatitis B patients from Baghdad, Iraq and their impact on liver function
...Show More Authors

Hepatitis B virus (HBV) infection is a significant global health problem. Populations of different ethnicities show great heterogeneity in HBV genotype frequency distributions. A cross-sectional study was conducted during June–October 2018 to determine frequency of HBV genotypes among chronic HBV patients from Baghdad, Iraq. The method of detection was nested polymerase chain reaction system. Further, the study assessed the impact of HBV genotypes on serum level of liver-function tests: total serum bilirubin, alkaline phosphatase, alanine aminotransferase and aspartate aminotransferase. Eighty chronic HBV patients were enrolled in the study. Six HBV genotypes were identified (A, B, C, D, E and F). The most frequently encountered genotypes

... Show More
Scopus (11)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
Hedges in Male and Female Language
...Show More Authors

Hedging is a linguistic phenomenon used to convey interpersonal messages in spoken interaction. It is a communicative strategy which enables speakers to soften the force of utterances or moderate the assertive force of  utterances. It is resulted from different features such as uncertainty, doubt, tentativeness, ambiguity, neutrality, mitigation, and subjectivity. Hedging is used widely in  TV debates to make utterances more acceptable to the interlocutors. Hedges are expressions used to communicate the speaker's  weak commitment to information conveyed. The utterances in debates are often hedged because in an unhedged form  might sound threatening to the addressees, and, therefore, be likely to be rejected.

&

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 02 2024
Journal Name
Journal Of The College Of Languages
Ironic Metonymy in Russian and Arabic
...Show More Authors

This article is devoted to the cognitive study of ironic metonymy in Russian and Arabic. Metonymy and irony have traditionally been seen as parallel linguistic phenomena. But their formation and interpretation are based on different cognitive mechanisms. At the formal and functional level, metonymy and irony have a number of significant differences. Metonymy is an artistic technique, the mechanism of which is based on obvious, easily traced connections between objects and phenomena of the surrounding world. Irony is a satirical technique or a rhetorical figure that is used to create a certain artistic image, aimed at forming the hidden meaning of the statement. A native speaker intuitively feels the difference between metonymy and i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 04 2004
Journal Name
5th Scientific Conference Of Engineering College In University Of Baghdad, 25th -27th Of February, Baghdad, Iraq
Technology and lighting in interior Design.
...Show More Authors

Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
Human rights in reality and ambition
...Show More Authors

The research aims to focus on the human rights guarantees as they are subjected to continuous violations due to changes, wars and conflicts between nations and people, especially in the Arab world and the third world due to political, social, economic and environmental conditions and the failure of democratic tracks under the current reality.

Keyword: Human rights, Reality, Ambition.

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Babis and Baha’is in Iran
...Show More Authors

The person who wants to learn. The history of Bab’is will notice a very
starnge phenomenon that they (Babis and Baha’is) resort to visions to prove their
delusion.
The believers usually reach to each other by their visions. This phenomenon
are shared among them from Al- Ahsa’ai time till the last phase of their propaganda
which is the Baha’is propaganda, and this is due to their ignorance and under
development in doctrine of islam which was widespread in Iran and the Islamic world.
The whole secrets of Babis and Baha’is movement were restricted among
particular group, most of them were Al- Rashti’s students and knew the basic
principles of their movement which deperding or (the principles) declarati

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
Approaches in media, role and mobilization
...Show More Authors

There is a natural problem raised by the issue of media performance. As a separate activity and express its own capabilities. This problem can be framed in the form of a question: Is media performance merely a reflection of the activity of other sectors of society, especially political and economic, and what links them to other societal sectors of interrelated relations? Is the media limited to mere transfer, or is it an industry with its own mechanisms and rules? The answer may seem somewhat complicated if we handle media with research and study in general, but the issue may be less complicated when it comes to Arab media, because its data may add another setback to the overall Arab setbacks.

View Publication Preview PDF
Crossref