Preferred Language
Articles
/
Fhf6OI8BVTCNdQwCVmSd
the role of religious satellite channels in adopting the values of moderation and moderation among the audience of the city of bghdad
...Show More Authors

Publication Date
Tue Jun 18 2019
Journal Name
Journal Of College Of Education For Women
Antonia's Mannish Behavioral Transition in Willa Cather's Novel My
...Show More Authors

Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Motion Scenes Direction Treatment in TV Drama: عشتار حبيب
...Show More Authors

The sense of motion generates a sense of the subject of action. The movement of the camera, the movement of actors, the movement of colors and lights, and other elements of the visual discourse, work together to enrich the image with a complete dynamic flow to reach the recipient. The research subject has been identified under the title "Motion Scenes Dramatic Treatment   in TV Drama".  The research is divided into an introduction and two theoretical sections in the theoretical framework:

The first section: The motion in TV drama in which the researcher dealt with the concept of motion and its types and the expressive and aesthetic role in television drama. The second section dealt with the elements of the visual a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2011
Journal Name
Journal Of The Saudi Society Of Dermatology & Dermatologic Surgery
“Acquired epidermodysplasia verruciformis” in kidney transplant patients
...Show More Authors

KE Sharquie, SA Al-Mashhadani, AA Noaimi, MY Abbas, Journal of the Saudi Society of Dermatology & Dermatologic Surgery, 2011 - Cited by 5

View Publication
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Limping in twenty years old male A Case Report
...Show More Authors

Background: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date.Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magne

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Global Pharma Technology
Auto-antibodies Profile in Children Infected with Visceral Leishmaniasis
...Show More Authors

Visceral leishmaniasis (VL) is a parasitic infection caused by an intracellular growth of Leishmania spp. in macrophage cells. The autoimmune disorder is a condition takes place when the immune system produces antibodies which incorrectly attacked its own body tissues. VL has been involved as an effect or on the autoimmune aspect. This study was conducted to identify the auto antibodies profile in patients infected with VL. The presences of auto antibodies in 21 Iraqi children infected with VL were tested for laboratory autoimmune aspect. The highest percentage of seropositive in Leishmania patients was observed for anti-ds DNA, anti-Mi-2, anti-Ku and anti-PCNA antibodies (90.5%, 90.5%, 90.5% and 61.9%) respectively, while the lowest percen

... Show More
Scopus
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
Phonological Metathesis in Iraqi Arabic Dialect: A Synchronic Perspective
...Show More Authors

Phonological metathesis can be defined as an alternation in the normal sequence of two sounds under certain conditions. The present paper is intended to give a detailed synchronic description of phonological metathesis in Iraqi Arabic dialect. For data collection, the researchers have adopted two naturalistic techniques, viz., observation and notes taking. A synchronic analysis is carried out to provide some evidence that describe the sequential change of phonological metathesis in the dialect under investigation. Such sequential changes of metathesized sounds are presented and tabulated. The study concludes with the following finding that this process is not limited to cases where two consonant sounds are transposed, but three consonant

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 29 2023
Journal Name
Wasit Journal For Pure Sciences
Suitable Methods for Solving COVID-19 Model in Iraq
...Show More Authors

Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Natural Convection in Trapezoidal Enclosure Heated Partially from Below
...Show More Authors

Natural convection in a trapezoidal enclosure with partial heating from below and symmetrical cooling from the sides has been investigated numerically. The heating is simulated by a centrally located heat source on the bottom wall, and four different values of the dimensionless heat source length, 1/5, 2/5, 3/5, 4/5 are considered. The laminar flow field is analyzed numerically by solving the steady, two-dimensional incompressible Navier-Stokes and energy equations. The Cartesian velocity components and pressure on a collocated (non-staggered) grid are used as dependent variables in the momentum equations  discretized by finite volume method; body fitted coordinates are used to represent the trapezoidal enclosure, and grid generatio

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 30 2024
Journal Name
Iraqi Journal Of Science
A Survey on Image Caption Generation in Various Languages
...Show More Authors

      The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o

... Show More
View Publication
Crossref (4)
Scopus Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref