This study deals with the subject of violence, but from another perspective, it has not been emphasized in contemporary studies of violence in Arabic and raqi universities, which is the structural or institutional aspect of violence. Traditional studies have focused their analysis of violence on the direct side the violence, The other side of the violence is the hidden violence, which is characterized by a lack of clarity of the underlying factors and its effects are not arises, which makes it the most serious violence, which requires a deep research into the social, political, economic, cultural and psychological structure of society (individuals and institutions). This study was based on the theory of the Norwegian scientist (J
... Show MoreThis research is focused on an interpretive of 2D seismic data to study is reinterpreting seismic data by applying sufficient software (Petrel 2017) of the area between Al-Razzazah Lake and the Euphrates river belonging to Karbala'a and Al-Anbar Governorates, central Iraq. The delineation of the sub-surface structural features and evaluation of the structure of Najmah and Zubair Formations was done. The structure interpretation showed that the studied area was affected by normal fault bearing (NW-SE) direction with a small displacement. In contrast, time and depth maps showed monocline structures (nose structures) located in the western part of the studied area.
The effect of chronic exposure to two different levels of cadmium chloride (CdCl2) 30 ppb and 40 ppb in drinking water for 12 weeks on thyroid function of mature male rabbits was studied. Eighteen mature male rabbits were randomly divided into three groups (each of six ) , control group (group I ): were offered ordinary tap water , and treated groups (II and III ) were offered tap water containing 30ppb and 40 ppb respectively for 12 weeks .Serum concentration of thyroxin (T4 ) and triiodothyronine (T3) were measured every six weeks ,as an index of thyroid function , further more , section of thyroid gland were prepared for histological studies. The results showed that chronic exposure of male rabbits
... Show MoreThis research represents a 3D seismic structural study for 602.62 Km2 of Dujaila
Oil Field which is located 55 Km Northwest of Mysan province and 20 Km Southwest
of Ali-AlSharki region within unstable Mesopotamian basin.
Synthetic traces are prepared by using available data of two wells (Du-1, Du-2), in
order to define and pick the reflectors. Two reflectors are picked that represent the top
and bottom of Mishrif Formation, in addition to five units within this Formation are
picked, they named Units 1, 2, 3, 4, and 5.
Time maps for the top and bottom of Mishrif reflectors are drawn to get the
structural picture, these maps show general dip of layers toward NE, and thus, there
are two enclosure domes in the midd
The cloud point extraction technique has become increasingly popular in recent years for trace metal separation and preconcentration. When heated to a specific temperature, cloud point extraction utilizes the property of nonionic surfactants in aqueous solutions to generate micelles and become turbid (so-called cloud point temperature). For analytical chemists, developing a simple and selective technology for the separation and determination of metals and medicinal drugs is a critical concern. Therefore, a sensitive, accurate, and green cloud point extraction (CPE) procedure was developed for the micro-determination of metal cations like zinc (II) and cadmium (II) in food samples. Triton X–114 and 1-(4-(Phenyldiazenyl) phenyl) a
... Show MoreA simple reverse-phase high performance liquid chromatographic method for the simultaneous analysis (separation and quantification) of furosemide (FURO), carbamazepine (CARB), diazepam (DIAZ) and carvedilol (CARV) has been developed and validated. The method was carried out on a NUCLEODUR® 100-5 C18ec column (250 x 4.6 mm, i. d.5μm), with a mobile phase comprising of acetonitrile: deionized water (50: 50 v/v, pH adjusted to 3.6 ±0.05 with acetic acid) at a flow rate 1.5 mL.min-1 and the quantification was achieved at 226 nm. The retention times of FURO, CARB, DIAZ and CARV were found to be 1.90 min, 2.79 min, 5.39 min and 9.56 min respectively. The method was validated in terms of linearity, accuracy, precision, limit of detection and li
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: Rehabilitation of the carious tooth to establish tooth structure integrity required cavity design that show a benign stress distribution. The aim of this study was to investigate the influence of the cavity position on the stress values in the reamining tooth structure restored with amalgam or resin composite. Materials and methods: Seven 2-D models of maxillary first premolar include class I cavity design was prepared, one sound tooth (A) 3 composite (B1, B2, and B3) and 3 amalgam (C1, C2, and C3). In design (BI and C1) the cavity position is in the mid distance between bacc-lingual cusp tip, design (B2 and C2) and (B3 and C3) shifted toward the buccal cusp and the lingual cusp for 0.5 mm respectively. One hundred N vertical
... Show More