Preferred Language
Articles
/
DRfb2Y0BVTCNdQwCeifa
Isolation and identification of yersinia enterocolitica from local ovine meat in the middle region of Iraq
...Show More Authors

Yersinia enterocolitica has ranked a third among the pathogens that most frequently cause gastrointestinal disorders transmitted to humans through food materials, especially contaminated meats. The meat infected with Yersinia enterocolitica had no change in apparent texture or smell. The aim of this research is to survey the frequency of Y. enterocolitica in ovine meat, compare their ratio of infection between the season, To carry out this study (125) samples of local ovine meat were collected by random sampling from the middle region of Iraq. The samples were divided into two groups steak and mince, then many microbiological tests (culture, & staining, biochemical Tests Api 20E, Vitik 2 and species-specific PCR amplicon for 16S RNA gene) were performed.(16%) of all of the studied Ovine meats sample were contaminated with Y. enterocolitica. The analysis of results with chi-square tests showed that there was a significant variation in the isolation percentage between seasons, also minced ovine meat was more contaminated than steak.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Annals Of Medicine And Surgery
Assessment of the difficulties in laparoscopic cholecystectomy among patients at Baghdad province
...Show More Authors

Scopus (7)
Scopus
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Nov 01 2024
Journal Name
Human Antibodies
The potential role of dyslipidemia in COVID-19 severity among Iraqi patients
...Show More Authors
BACKGROUND:

The correlation between dyslipidemia and the severity of coronavirus disease 2019 has been widely categorized. Dyslipidemia is one of the most dominant disorders among these patients. Systemic inflammation accompanied by cytokine storm hemostasis modifications and severe vasculitis have all been reported to occur among COVID-19 patients, and these may contribute to some severe complications.

OBJECTIVE:

The aim of this study is to assess the possible relationship between dyslipidemia and the severity of coronavirus disease 2019.

METHODS:

This work encompassed 200

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
The Similarity in the Holy Quran
...Show More Authors

The method of Similarity of important topics in Arabic Rhetoric has ample evidence in the Qur'an and the Hadith and the words of the Arabs and this study is limited to only the Koran.
There have been Similarity in the Holy Quran on both types : investigative and discretion , but the verses are more Similarity investigative and in verse 49 Similarity investigative and in verse 25.
The rush of Albulageyen and many other examples of Quranic Vmtheloa on Similarity , with a linguistic analysis and return to the origins of the meanings are not properly counted Similarity , Kolvaz cunning , deception , and maliciousness , the bad and ridicule.
This study seeks as much as possible to the statement of this phenomenon and stand on these t

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
The idea strategy in the theater
...Show More Authors

There is an association between the signifier and the signifier. This association shows the eyeball, which acquires a direct presence and whose presence influences the level of production of the hidden connotation. Because the theatrical presentation is a series of auditory-visual functions, these signs are looking for the exploration of their meanings and their evocation to form a complete loop to achieve the association of the above. This is what made the researcher to monitor the abundance of semantic shifts in theatrical presentation as long as the implications of the strategy continue in the game of semantic production with multiple horizons, and the idea in theatrical presentation tolerates multiple readings according to the refere

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
The will In the Islamic concept
...Show More Authors

I often read in Islamic jurisprudence in all chapters as much as possible from divine success, time and health, and everything I read in any of the chapters of jurisprudence, I see divine light, eternal wisdom, and a constitution that does not accept error and alteration, as I looked at the great jurisprudential treasures and this enormous wealth, A person finds in himself helplessness in front of this law, how clear, easy, and accurate it is, and it contains permanent good for man, as it is a religion of mercy, benevolence, and goodness, and among these chapters of jurisprudence is the jurisprudence of the commandment. Of the reasons, in the will, the person has had the opportunity to make up for what he missed of doing good that a pers

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
The role of an active teacher in developing the curriculum by using educational techniqes a theoretical study
...Show More Authors

Preparing teacher occupies the attention of many thinkers and philosophers since the age of
kaldinics ( people of mesoptam / 2342 pH ) to the Islamic age where moslems philosophers
focus their attention on thought and philosophy where the philosophy of that teaching
depends on : teacher , student and family begin .
So , the issue of preparing and training teacher occupies the attention of education scientists
depending on his vital and important role in implementing of teaching policies in philosophies
and Islamic educational thought , therefore , the preparing and development of the teacher
regards as one of the basics of teaching development because of its importance in
development of teaching performance and th

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 20 2022
Journal Name
International Journal Of Early Childhood Special Education
The Impact of the Visual Teaching Strategy by using Infographic in mathematics achievement for intrmediate grade students
...Show More Authors

The research aims to identify the impact of the visual teaching strategy by using infographics mathematics achievement for intermediate grade students. The experimental research method was adopted, as the experimental design of two independent and equal groups with a post test was used, whereas the experiment was applied on a sample consisting of (52) male students from first- intermediate grade students in (Al-Haq Al-Mubin intermediate school for Boys) of the General Directorate in Anbar Governorate - Department Education in Fallujah for the academic year (2021-2022), and the research sample was distributed equally on the two research groups, and Division (B) was chosen randomly to be the experimental group, while Division (A) was the cont

... Show More
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Enhancing audit procedures in accordance with the international assurance standard through the implementation of a proposed program
...Show More Authors

Abstract:             

                  The research seeks to identify the role of the International Assurance Standard (3402) in the auditor's procedures, as the importance of the research stems from providing assurance services for control tools through reports that are prepared according to this standard, which contribute to strengthening audit procedures through a proposed assurance program. Many conclusions were reached, the most important of which The assurance operations are considered among the operations with a special assignme

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Use some probability amputated models to study the characteristics of health payments in the Iraqi Insurance Company
...Show More Authors

 

Abstract

Due to the lack of previous statistical study of the behavior of payments, specifically health insurance, which represents the largest proportion of payments in the general insurance companies in Iraq, this study was selected and applied in the Iraqi insurance company.

In order to find the convenient model representing the health insurance payments, we initially detected two probability models by using (Easy Fit) software:

First, a single Lognormal for the whole sample and the other is a Compound Weibull  for the two Sub samples (small payments and large payments), and we focused on the compoun

... Show More
View Publication Preview PDF
Crossref (2)
Crossref