Preferred Language
Articles
/
JxeKII4BVTCNdQwCZzK_
Calculus part 2
...Show More Authors

This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Choosing the best method for estimating the survival function of inverse Gompertz distribution by using Integral mean squares error (IMSE)
...Show More Authors

In this research , we study the inverse Gompertz distribution (IG) and estimate the  survival function of the distribution , and the survival function was evaluated using three methods (the Maximum likelihood, least squares, and percentiles estimators) and choosing the best method estimation ,as it was found that the best method for estimating the survival function is the squares-least method because it has the lowest IMSE and for all sample sizes

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 12 2023
Journal Name
Agbioforum
Assessing the Impacts of Consumer Awareness on Consumer Purchase Intention with Moderating Role of Product Label: Evidence from Consumers of Iraqi Manufacturing Firms
...Show More Authors

View Publication Preview PDF
Scopus (3)
Scopus
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Minimally invasive access cavities in endodontics
...Show More Authors

Background: The access cavity is a critical stage in root canal therapy and it may influence the subsequent steps of the treatment. The new minimally invasive endodontic access cavity preparation concept aims to preserve sound tooth structure by conserving as much intact dentine as possible including the pulp chamber's roof, to keep the teeth from fracturing during and after endodontic treatment. While there is great interest in such access opening designs in numerous publications, still there is a lack of scientific evidence to support the application of such modern access cavity designs in clinical practice. This review aims to critically examine the literature on minimal access cavity preparations, explain the effect of minimally inva

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluating the Clinical Outcomes of Three Medication Regimens for Treating a Sample of Iraqi Persistent Asthmatic patients
...Show More Authors

Abstract

    Asthma is a complex disease defined by chronic airway inflammation and airflow limitation causing variable respiratory symptoms which include shortness of breath (SOB), wheezing, chest tightness and cough. Asthma guidelines advocate adding a second long acting bronchodilator to medium doses of inhaled corticosteroids (ICS) rather using high doses of ICS alone to control moderate to severe persistent asthma. The aim of this study was to evaluate the clinical outcomes of three medication regimens indicated for Iraqi patients suffering from persistent asthma. 

    This study was interventional randomized clinical study conducted on a sample of adult Iraqi asthm

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Problem of Political Empowerment of Women with Disabilities in Light of Iraqi Legislation
...Show More Authors

Democracy in any country is measured by the cultural, social and economic level reached by women in it in general and women with disabilities in particular, and the extent of their participation in political life and political decision-making. As a result of the patriarchal power that societies have known, including Iraq, history has witnessed multiple types and forms of discrimination against women, which differed from one country to another, this matter has pushed women and since the beginning of the last century the issue of women's rights has been raised at the global, regional and national levels, through holding international conferences and agreements In order to empower women in all social, economic and political fields.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Impact of Turkish water policy on developmentAgricultural sector in Iraq for the period (1990-2006)
...Show More Authors

تسعى تركيا ضمن سياساتها المائية ومنذ زمن بعيد وبأصرار على تنفيذ المزيد من بناء السدود والمشاريع التخزينية المائية على حوضي دجلة والفرات، الامر الذي يؤدي بالضرورة الى تناقص معدل الواردات المائية لنهري دجلة والفرات الداخلة للاراضي العراقية .وبالتالي التأثير على مقومات التنمية الزراعية العربية بشكل عام والتنمية الزراعية بالعراق بشكل خاص ومن ثم تهديد الامن الغذائي الوطني.

لذا فأن البحث يهد

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
DETERMINATION OF THE OPTIMUM OPERATING CONDITIONS IN THE GRANULATION OF GAMMA ALUMINA CATALYST SUPPORT
...Show More Authors

Granulation Technique for Gamma Alumina Catalyst Support was employed in inclined disk granulator (IDG), rotary drum granulator (RD) and extrusion – spheronization equipments .Product with wide size range can be produced with only few parameters like rpm of equipment, ratio of binder and angle of inclination. The investigation was conducted for determination the optimum operating conditions in the three above different granulation equipments.
Results reveal that the optimum operating conditions to get maximum granulation occurred at ( speed: 31rpm , Inclination:420 , binder ratio:225,300% ) for the IDG,( speed: 68rpm , Inclination: 12.50 , binder ratio: 300% ) for the RD and ( speed:1200rpm , time of rotation: 1-2min )for the Caleva

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
New sizes of complete (k, 4)-arcs in PG(2,17)
...Show More Authors

              In this paper, the packing problem for complete (  4)-arcs in  is partially solved. The minimum and the maximum sizes of complete (  4)-arcs in  are obtained. The idea that has been used to do this classification is based on using the algorithm introduced in Section 3 in this paper. Also, this paper establishes the connection between the projective geometry in terms of a complete ( , 4)-arc in  and the algebraic characteristics of a plane quartic curve over the field  represented by the number of its rational points and inflexion points. In addition, some sizes of complete (  6)-arcs in the projective plane of order thirteen are established, namely for  = 53, 54, 55, 56.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 07 2022
Journal Name
في مجلة الدراسات الللغوية والترجمية
Semantic and cultural analysis of phraseological units with the names of wild animals in Russian and Arabic
...Show More Authors

Summary:This article discusses the topic of phraseological units with the names of wild animals in the Russian and Arabic languages in the aspect of their comparative semantic and cultural analysis, since a comparative analysis of the meanings of phraseological units of the Arabic and Russian languages, detection of coincidences and differences in the compared languages, is an important method for studying linguoculturology, since phraseological units represent a reflection of culture in the language

Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref