Preferred Language
Articles
/
GhdguI0BVTCNdQwCSxr-
A morphological study and a new species registration of genus Xerophloea Germa, 1839 sp.nov. From sub-family Ledrinae Fairmai, 1855 of the leafhopper (Hemiptera: Cicadellidae) in Iraq
...Show More Authors

Scopus
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of financial technology in improving the financial performance of banks: A field study on a sample of private banks in Erbil governorate
...Show More Authors

Abstract:

               Today, the financial and banking sector is witnessing a qualitative shift thanks to financial technology services, which provide their services to many individuals and companies in quick, easy and less expensive ways compared to traditional means. Financial technology is a new form of financial science that combines financial transactions and technological skills concerned with providing financial services and improving the work environment within Banking institutions, and financial technology provides many advantages such as lower transaction costs, instant payment, and saving more time and effort in conducting banking

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2022
Journal Name
Journal Of Positive School Psychology
Designing A Quality Costing System In Commercial Banks (Applied Research In The Investment Bank Of Iraq)
...Show More Authors

Preview PDF
Publication Date
Wed Dec 15 2021
Journal Name
Al-academy
Realism in the painting of Iraqi Kurdistan artists "A Study in methods of expression"
...Show More Authors

The tagged research (realism in the Paintings of Iraqi Kurdistan artists, “a study of expression methods”) dealt with realism in an objective way, as well as the complexity of its concepts through its formations and formations. On realism and its historical dimension in concept and meaning, as for the second chapter, the research was focused on the methods of expression in painting, while the third chapter was concerned with the procedural applications of realistic methods of expression in the drawings of Iraqi Kurdistan, and according to these axes and to achieve the goal of the research, a number of Among the results are:
1- Realism documented the life of the Kurdish society in line with the developments of the era, as the sty

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 09 2020
Journal Name
International Journal Of Agricultural And Statistical Sciences
Host plant resistance, chili pepper to whitefly, Bemisia tabaci (gennadius) (Hemiptera: Aleyrodidae) in field
...Show More Authors

A field study was conducted in Al-Khalis district, Diyala Governorate in 2019 to test the sensitivity of three varieties of pepper to the population density of the whitefly B. tabaci, Anaheim pepper, Aleppo and local variety, and the results showed that the Anaheim variety was the most infested with the whitefly density 4.08 whitefly/ leaf and then the local variety 2.7 whitefly/ leaf. The lowest population density was 1.25 whitefly/ leaf of Aleppo variety. Variety Aleppo also recorded the lowest percentage of whitefly infection B. tabaci of 39.22%, but not have significant differences in the percentage of whitefly infestation, as it reached 53.64% and 54.85% for the Anaheim and local varieties, respectively. The resistance of variety Alepp

... Show More
Scopus (6)
Scopus
Publication Date
Tue Nov 18 2014
Journal Name
Conference: First International Engineering Conference (iec2014)at: Ishik University, Erbil, Krg, Iraq
Visualization of People Attraction from Mobile Phone Trace Database: A Case study on Armada 2008 in French City of Rouen
...Show More Authors

The mobile phone is widespread all over the world. This technology is one of the most widespread with more than five billion subscriptions making people describe this interaction system as Wireless Intelligence. Mobile phone networks become the focus of attention of researchers, organizations and governments due to its penetration in all life fields. Analyzing mobile phone traces allows describing human mobility with accuracy as never done before. The main objective in this contribution is to represent the people density in specific regions at specific duration of time according to raw data (mobile phone traces). This type of spatio-temporal data named CDR (Call Data Records), which have properties of the time and spatial indications for th

... Show More
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
He saw a linguistic study, in the Noble Qur’an
...Show More Authors

 

In the name of God, praise be to God, and prayers and peace be upon the best of God’s creation, Muhammad bin Abdullah, and upon his family and companions, and from his family:
And after:
     He saw from verbs that transcend one effect if it is visual and to two effects if it is heart and this action has several strokes and it is an awareness of the sense and illusion and imagination and reason and in addition to that it has many meanings dealt with in the glossary books and as for what the verb included in the audio studies it is the explanation and deletion and slurring The heart of my place. As for what the grammatical studies included, it focuses on one or two effects according to its l

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Fri Jan 29 2021
Journal Name
Research Journal Of Pharmacy And Technologythis Link Is Disabled.
Exploration of a new fluoride resistance gene (Fram gene) in oral streptococcus mutans maw
...Show More Authors

Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
A New Two Derivative FSAL Runge-Kutta Method of Order Five in Four Stages
...Show More Authors

A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Mechanical Engineering Research And Developments
Development of natural convection heat transfer in heat sink using a new fin design
...Show More Authors

Scopus (2)
Scopus