Preferred Language
Articles
/
CRePZJMBVTCNdQwCiNN1
A Feminist Rhetorical Analysis of Anti-feminist Poetry in English and Arabic
...Show More Authors

Crossref
View Publication
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Topology-Based Modularity and Modularity Density for Detecting Protein Complexes: A Comparative Study
...Show More Authors

     Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Geopolitical dimensions to build a dam on the downstream Renaissance (Egypt and Sudan)
...Show More Authors

Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
المجلة السياسية والدولية
Foreign Policy and Asymmetric Threats The United States after 2001 as a model
...Show More Authors

يشهد المسرح الدولي قضايا مستجدة ومستحدثة مثل تعدد الفاعلين من الدول ومن غير الدول وتزايد مساحات نفوذهم وتأثيرهم ،ومن جانب اخر أثرت جائحة كورونا على البيئة والمناخ بشكل ملموس على جوانب عدة. فضلا عن ذلك تأثرت جميع المجتمعات البشرية بالإرهاب والهجمات الالكترونية وغيرها ومن بينها دول والمجتمع الدولي بإفراده مؤسسات وكيان اقتصادي وسياسي وقانوني وأمني وامتداد اثاره واسبابه الكثيرة والمتداخلة وما يثيره من خلق حا

... Show More
Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 07 2025
Journal Name
The Peerian Journal
Plant-Bacterial Interactions: A latent Alliance for Growth promotion and Environmental Stress Tolerance
...Show More Authors

This encapsulates the general relationship between plant and bacteria in the natural and agricultural ecosystem. It is based on the activities of useful bacteria, such as plant growth-promoting bacteria (PGPRs) and nitrogen-fixing bacteria, in promoting plant growth and plant tolerance to stressful situations regarding pollution, salinity, and drought. The article also mentions that the bacteria maintain plant health by secretion of phytohormones, nitrogen fixation, solubilization of phosphate, and production of antibiotics against pathogenic bacteria. The article also mentions the existing applications of the interaction in sustainable agriculture and bioremediation of contaminated soils.

View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
Pakistan: The most dangerous terrorist extremism hotbed (a study information, limitations, and factors)
...Show More Authors

   Receipt date:10/27/2021    accepted date:12/15/2021     Publication date:31/12/2021

        Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

The phenomenon of extremist extremism (terrorism) was one of the most prominent issues that took a large space in the twenty-first century, in which cognitive motives were mixed with strategic and ideological motives, leading to the emergence of terrorist extremi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Pakistan Heart Journal
Workplace Violence and Nursing Job Performance at Pediatric Emergency Departments: A Comparative Study
...Show More Authors

Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Comparison between Rowatinex and Tamsulosin as a Medical Expulsion Therapy for Ureteral Stone
...Show More Authors

The objective of this study is to evaluate the efficacy and safety of rowatinex and tamsulosin in the treatment of patients with ureteric stone.

Forty patients with ureteric stone ranged (4- 12) mm, were included in this study. They were randomized into two groups where the first group includes twenty patients treated with Rowatinex three times daily (Group 1), and the second group includes twenty patients treated with tamsulosin 0.4mg/day (Group 2). All patients were randomly assigned to receive the designed standard medical therapy for a maximum of 3 weeks.

Each group was given an antibiotic as prophylaxis and an injectable non-steroidal anti-inflammatory drug used on demand. At the outpatient clinic all subjects were a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (11)
Crossref