Preferred Language
Articles
/
LBd_wpEBVTCNdQwCk5rK
Association of overweight/obesity with the severity of periodontitis using BPE code in an iraqi population
...Show More Authors

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
The theory of distortion and eradication in modern Zionist Hebrew literature: תיאוריית העיוות והחיסול בספרות העברית הציונית החדשה
...Show More Authors

This title may have something strange or paradoxical; it is unusual or natural to look for violence in literature, or that literature is a tool for killing through the contribution of writers and poets in generating, feeding or advocating violence. The Zionist literature belongs to the 20th century, is almost the only literature among the etiquette of peoples, which professes racism and boasts of betraying its human role, and wants to be a vehicle for terrorism domination. It also tends to be a means in the hands of killers and adventurers.   Writers of this Literature show that no solution to the Jewish problem is only by Zionist presence to replace the Palestinian presence and to build the state of "Israel" on the ruins of Pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Trends in Contemporary Ceramic Art and the Overlapping of Stylistic Concepts (Installation Art and Assemblage as a Model)
...Show More Authors

Contemporary arts have achieved, in accordance with the transition of concepts, a new logic in presentation and expression in general, and specifically in the field of ceramic art. The shift towards the logic of rejection and subversion of prevailing methods, which have been almost a constant foundation for a long period, has directly influenced the direction of visual arts in the contemporary world.
The growth and cultural transformations that the world has witnessed after the two World Wars have produced cognitive shifts based on strategies that diverge from the dominant culture. These approaches vary according to existential needs, as the language of art has become conceptual and a medium for contemporary culture with its rapid an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
The Effect of Urban Land Use Changing on Green Area Neighborhoods No. 336 & 338 in Baghdad – Case Study
...Show More Authors

The role of the green areas lies in being one of the systems that plays the vital role in achieving the environmental dimension besides the socio-cultural body and the economic dimension in the hidden value of ecosystem services. However, many developing countries are characterized by a state of low community environmental awareness, which coincides with the basic need for land for housing and other uses, to take precedence over nature protection strategies. In the absence of clear planning and long-term planning strategies, all this led to abuses and violations of urban land use. In Iraq, the situation became more apparent due to the political, security and social conditions that followed the year 2003. Hence, the resea

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
The Influence of NMI against Modularity in Community Detection Problem: A Case Study for Unsigned and Signed Networks
...Show More Authors

Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo

... Show More
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Nov 14 2018
Journal Name
Journal Of Radioanalytical And Nuclear Chemistry
Prostate tumor therapy advances in nuclear medicine: green nanotechnology toward the design of tumor specific radioactive gold nanoparticles
...Show More Authors

We report herein an innovative approach to prostate tumor therapy using tumor specific radioactive gold nanoparticles (198Au) functionalized with Mangiferin (MGF). Production and full characterization of MGF-198AuNPs are described. In vivo therapeutic efficacy of MGF-198AuNPs, through intratumoral delivery, in SCID mice bearing prostate tumor xenografts are described. Singular doses of the nano-radiopharmaceutical (MGF-198AuNPs) resulted in over 85% reduction of tumor volume as compared to untreated control groups. The excellent anti-tumor efficacy of MGF-198AuNPs are attributed to the retention of over 90% of the injected dose within tumors for long periods of time. The retention of MGF-198AuNPs is also rationalized in terms of the higher

... Show More
View Publication
Scopus (40)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Laser
PDF Temporal Pulse Compression Using Double Cladding Polarization Maintaining Fiber Nested Mach- Zehnder Interferometer
...Show More Authors

 

Abstract: Narrow laser pulses have been essential sources in optical communication system. High data rate optical communication network system demands compressed laser source with unique optical property. In this work using pulsed duration (9) ns, peak power 1.2297mW, full width half maximum (FWHM) 286 pm, and wavelength center 1546.7 nm as compression laser source. Mach Zehnder interferometer (MZI) is built by considering two ways. First, polarization maintaining fiber (PMF) with 10 cm length is used to connect between laser source and fiber brag grating analysis (FBGA). Second, Nested Mach Zehnder interferometer (NMZI) was designed by using three PMFs with 10 cm length. These three Fibers are splicing to sing

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Laser
PDF Towards C+L Band Three-Mode (De)Multiplexer Using Subwavelength Grating (SWG) Technology
...Show More Authors

Abstract: Recently, there is increasing interest in using mode-division multipelexing (MDM) technique  to enhace  data rate transmission over multimode fibers.  In this technique, each fiber mode is treated as a separate optical carrier to transfer its own data.  This paper presents a broadband, compact, and low loss three-mode (de)multiplexer designed for C+L band using subwavelength grating (SWG) technology and built-in silicon-on-insulator SOI platform. SWG offers refractive index engineering for wider operating bandwidth and compact devices compared to conventional ones. The designed (de)multiplex deals with three modes (TE0, TE1, and TE2) and has a loss > -1 dB and crosstalk < −15 dB, and its operation c

... Show More
View Publication Preview PDF
Publication Date
Wed May 03 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Enhancing smart home energy efficiency through accurate load prediction using deep convolutional neural networks
...Show More Authors

The method of predicting the electricity load of a home using deep learning techniques is called intelligent home load prediction based on deep convolutional neural networks. This method uses convolutional neural networks to analyze data from various sources such as weather, time of day, and other factors to accurately predict the electricity load of a home. The purpose of this method is to help optimize energy usage and reduce energy costs. The article proposes a deep learning-based approach for nonpermanent residential electrical ener-gy load forecasting that employs temporal convolutional networks (TCN) to model historic load collection with timeseries traits and to study notably dynamic patterns of variants amongst attribute par

... Show More
View Publication
Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref