Preferred Language
Articles
/
IhZIDIwBVTCNdQwCqvfe
USING A NEW METHOD TO INDUCE TARGETED GENETIC MUTATIONS IN POTATO VIRUS Y (PVY)
...Show More Authors

Scopus
Publication Date
Wed Aug 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Spectroscopic Studies of a New Mixed Ligand Complex of Fe(III) in Aqueous Medium
...Show More Authors

A spectrophotometric study of Fe(III) mixed ligand complex has been

performed  involving  1,4 phenylenediamine  (A) and  anthran i lic acid (B) ligand  at 25°C  and  aconstant  ionic strength  of  µ= 0.05M  NaC I04•  The optimum  pH was  found  to be pH=4.l. The format ion  rat io of the new complex   is   determined   to   be   2:1:4  of   Fe(III):(A):(B).   The   molar absorptivity was determined to be :::::: 0.5 x  I 04•  Stepwise spectrum change of the complex formation  is recorded by continuous flow system. Keywords: Mixed ligand

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2001
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
HAEMOPROTEIDS OF THE AVIAN FAMILY RALLIDAE IN IRAQ WITH DESCRIPTION OF A NEW SPECIES
...Show More Authors

A survey of haemoproteids among the eight species of Iraq rallids were carried out in the
middle, south, and west of Iraq. Two haemoproteods were recorded, Haeomproteus porzanae
(Galli-Valerio, 1907) as a new record for Iraq and the new species H. baghdadensis described
from Fulica atra L. collected in the middle of Iraq.

View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Fri Jan 29 2021
Journal Name
Research Journal Of Pharmacy And Technologythis Link Is Disabled.
Exploration of a new fluoride resistance gene (Fram gene) in oral streptococcus mutans maw
...Show More Authors

Publication Date
Sat Jul 01 2000
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
ON A NEW CESTODE FROM THE AVOCET RECUR VIROSTRA AVOCETTA L. COLLECTED IN IRAQ
...Show More Authors

Several specimens of the avocet, Recurvirostra avocetta L. are found infected with
Himantocestus gigantivcus sp. nov. ( Cestoda , Diploposthidae) . This cestode is related to H.
blanksoni Ukoli 1965 but easily differentiated from it in having longer and wider strobila,
larger size of testes but lesser in number, cirrus situated in the middle of mature segment
histead of anterior third and slightly posterior to the middle in gravid segment instead of the
middle , ovary and vitelline gland are larger , and the uterus has more branches.

View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Iraqi Journal Of Science
Genetic variation of IRS1 gene in women with gestational diabetes mellitus in third trimester stage in Iraq
...Show More Authors

Gestational diabetes mellitus (GDM) is a growing health concern that usually appears during the second and third trimester stage of pregnancy and is characterized by carbohydrate intolerance of variable severity. The aim of the present study was to scrutinize the relationship between the G972R polymorphism of the insulin receptor substrate-1 (IRS-1) gene with GDM in the Iraqi female population. One hundred and twenty of blood samples taken from healthy women (control) and women with gestational diabetes mellitus in 3rd trimester stage of pregnancy, fasting blood glucose (FBG) and HbA1c% measured to diagnose GDM, lipid profile (cholesterol, triglyceride, HDL, LDL, and VLDL), insulin concentration, insulin resistance and beta cell function to

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 31 2015
Journal Name
مجلة الترجمة واللسانيات
Traducción de los textos turísticos del español al árabe: (Problemas y Soluciones)
...Show More Authors

Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
La Visión Filosófica en las Célebres Obras Literarias y Dramáticas de Unamuno
...Show More Authors

Desde la Salamanca de doradas piedras que tantas veces cantara, don Miguel de Unamuno dio a la literatura y al pensamiento españoles unas obras que, a pesar de muchos pesares, perdura viva, como viva fue su agónica existencia.  

   El bilbaíno Miguel de Unamuno (1864-1936) es autor de al menos, doce obras teatrales. Su costumbre de mezclar géneros literarios, sin distinguir claramente el drama de la novela dialogada, le llevó a preferir el teatro leído. De ahí que sus estrenos fuesen, frecuentemente, muy posteriores a las ediciones impresas.

Abstract:

   The Bilbao Miguel de Unamuno (1864-1936) is the author of at least twelve plays. His habit of mixing genres,

... Show More
View Publication Preview PDF