ZG Abdulrazaq, MR Younus, Nasaq, 2023
The principle of rights and duties is part of the reform project of the Commander of the Faithful Ali ibn Abi Talib, to build a state of institutions whose foundations have been built on Quranic rules, a prophetic biography, and his diligence in doing so in accordance with the requirements of interests and evil, and his certainty in determining the most important and important, and research analytical study of speeches Imam Ali and his career, in this study (the principle of rights and duties) of the ruler and the parish because of their role in the reform process, which depends on the demolition and construction together, as it is the responsibility of the ruler to demolish all constructed corrupt and contrary to the principles of Islam
... Show MoreThis work aimed to estimate the frequency of mitochondrial inborn errors of metabolism (MIEMs) in patients presenting with family history and IEM-picture who referred for advance IEM assay in Mosul province and Kurdistan region. This study was observational study conducted on 364 cases referred from different general /or private pediatric clinics with unexplained sign and symptoms and suspension of mitochondrial dysfunction. The study included 364 children with an age ranging from 1 month to 1 year. Started from January 2018 to January 2020. All patients referred with their full history review, notes about their clinical examination, and laboratory investigations including blood ammonia, serum lactate/ pyruvate, arterial blood gases. In
... Show MoreA taxonomic keys was established of book and bark lice Order Psocoptera to isolated insects in Iraq from different localities of Baghdad and Babylon provinces. Thirteen species belong to eight genera and five families have been studied and described in details, these species were recorded for the first time in Iraq. These species are: Belaphopsocus badonneli New, 1971; Belaphotroctes oculeris Bodonnel, 1973; Embodopsocosis newi Bodonnel, 1973; Epipsocus stigamaticus Mockeord, 1991; Lepinotus huoni Schmidt and New, 2008; Liposcelies decolor Peramane 1925 Liposcelies paeta Pearman 1942 Liposclies bostrychphila Badonnel 1931; Liposclies brunnea Mostchulsky 1852; Liposclies entoophila Enderlein 1907; Neopsocopsis minuscule Li 2002 ;
... Show MoreOver the past decades, several studies have examined the subcellular localization of the cauliflower mosaic virus (CaMV) P6 protein by tagging it with GFP (P6-GFP). These investigations have been essential in the development of models for inclusion body formation, nuclear transport, and microfilament-associated intracellular movement of P6 inclusion bodies for delivery of virions to plasmodesmata. Although it was shown early on that the translational transactivation function of P6-GFP was comparable to wild type P6, it has not been possible to incorporate a P6-GFP gene into an infectious clone of CaMV. Consequently, it has not been possible to formally prove that a P6-GFP fusion is comparable in function to the unmodified P6 protein. Here w
... Show MoreThis study relates to the estimation of a simultaneous equations system for the Tobit model where the dependent variables ( ) are limited, and this will affect the method to choose the good estimator. So, we will use new estimations methods different from the classical methods, which if used in such a case, will produce biased and inconsistent estimators which is (Nelson-Olson) method and Two- Stage limited dependent variables(2SLDV) method to get of estimators that hold characteristics the good estimator .
That is , parameters will be estim
... Show MoreIn this study, poly4-(nicotinamido)-4-oxo-2-butenoic acid (PNOE) was prepared by the electro polymerization of 4-(nicotinamido)-4-oxo-2-butenoic acid (NOE) monomer on a 316 stainless steel (St.St) which acts as an anticorrosion coating. Fourier transforms infrared (FTIR), atomic force microscopy (AFM), scanning electron microscopy (SEM), and cyclic voltammetry were used to diagnose the structure and the properties of the prepared polymer layer. The corrosion behavior of the uncoated and coated 316 St.St were evaluated by using an electro chemical polarization technique in 0.2 M hydrochloric acid solution as a corrosive medium at a temperature range of 293 to 323 K. Nano materials, such as nano ZnO and graphene were added in di
... Show MoreThe research aims to analysis of the current financial crisis in Iraq through knowing its causes and then propose some solutions that help in remedy the crisis and that on the level of expenditures and revenues, and has been relying on the Federal general budget law of the Republic of Iraq for the fiscal year 2016 to obtain the necessary data in respect of the current expenditures and revenues which necessary to achieve the objective of the research , and through the research results has been reached to a set of conclusions which the most important of them that causes of the current financial crisis in Iraq , mainly belonging to increased expenditures and especially the current ones and the lack of revenues , especially non-oil o
... Show MoreMaximum power point tracking (MPPT) is used in photovoltaic (PV) systems to enhance efficiency and maximize the output power of PV module, regardless the variation of temperature, irradiation, and the electrical characteristics of the load. A new MPPT system has been presented in this research, consisting of a synchronous DC-DC step-down Buck converter controlled by an Arduino microcontroller based unit. The MPPT process with Perturb and Observe method is performed with a DC-DC converter circuit to overcome the problem of voltage mismatch between the PV modules and the loads. The proposing system has high efficiency, lower cost and can be easily modified to handle more energy sources. The test results indicate that the u
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More