Preferred Language
Articles
/
LRa11ocBVTCNdQwCwWrN
Theoretical calculation of the electronic current at N3 contact with TiO2 solar cell devices
...Show More Authors

(3) (PDF) Theoretical calculation of the electronic current at N3 contact with TiO2 solar cell devices. Available from: https://www.researchgate.net/publication/362780274_Theoretical_calculation_of_the_electronic_current_at_N3_contact_with_TiO2_solar_cell_devices [accessed May 01 2023].

Crossref
View Publication
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Bacterial Infections Associated with Cutaneous Leishmaniasis
...Show More Authors

Background:Oriental sore occurs mostly in the
mediteranian region , North Africa ,and the Middle East .
Rodents are the main reservoir for the parasite . The wet
type caused by L. major is rural and the dry type caused by
L. tropica is urban and humans are presumably the only
reservoir. Sand fly vectors are involved in all forms.
Objectives: This study aimed to show the most
important bacterial infections concomitant with cutaneous
leishmaniasis .
Methods; The study was performed on 75 patients (ages
1-50 years ) from both sexes were attending Skin Diseases
Department of Ramadi General Hospital during the period
extended from January to June 2000. These patients were
clinically diagnosed as patients

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Revista Latinoamericana De Hipertensión
Autonomic symptoms in patients with migraine
...Show More Authors

Scopus
Publication Date
Mon Jan 01 2024
Journal Name
Jordanian Journal Of Computers And Information Technology
ARABIC SOFT SPELLING CORRECTION WITH T5
...Show More Authors

Spelling correction is considered a challenging task for resource-scarce languages. The Arabic language is one of these resource-scarce languages, which suffers from the absence of a large spelling correction dataset, thus datasets injected with artificial errors are used to overcome this problem. In this paper, we trained the Text-to-Text Transfer Transformer (T5) model using artificial errors to correct Arabic soft spelling mistakes. Our T5 model can correct 97.8% of the artificial errors that were injected into the test set. Additionally, our T5 model achieves a character error rate (CER) of 0.77% on a set that contains real soft spelling mistakes. We achieved these results using a 4-layer T5 model trained with a 90% error inject

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu May 15 2025
Journal Name
Journal Of Legal And Political Studies
International and Regional Competition in the Middle East and its Impact on Iraqi National Security, with Special Reference to the Kurdistan Region: A Study of Challenges and Opportunities
...Show More Authors

This competition between competing forces, organized into axes with conflicting objectives, is reflected in all regional affairs and the goals and interests of countries within them, including Iraq. Among the most important aspects impacted by the repercussions of international and regional competition in the region is Iraqi national security, based on its vital importance in preserving the sovereignty and entity of the Iraqi state, protecting the interests and cohesion of the state and people, ensuring and defending their present and future, and interacting with various regional and international activities. The Kurdistan Region, as an important part of Iraq with its own unique characteristics, may be one of the most important regi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
Imam Al-Mubarakpuri's Jurisprudential Choices (d.1353 AH) in the Borders from his book "Tuhfat Al-Ahwadi" with the explanation of "Jami' Al-Tirmidhi / a comparative jurisprudential study
...Show More Authors

Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers and his family and companions.

The study of the jurisprudential opinions of scholars, their choices, or their weightings, sheds light on the approach they followed in their choices, and reveals the originality of the scholar or his influence on those who preceded him from among the scholars.

And the commentators of the noble hadith of the Prophet have their important contributions in this aspect, as they undertake the task of explaining the noble hadith, the second source of legislation

Contemporary commentators have their share in the service of the honorable hadith, and the statement of their choices and preferences, and am

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 10 2026
Journal Name
Journal Of Administration And Economics
Bayesian Method in Classification Regression Tree to estimate nonparametric additive model compared with Logistic Model with Application
...Show More Authors

The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 18 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Some Pro and Anti-Inflammatory Cytokines in Children with Tonsillitis and their Correlations with Vitamin D Deficiency
...Show More Authors

Inflammation of the tonsils could be described as acute tonsillitis, mainly due to infection. Recurrent tonsillitis could be defined as 3-7 episodes during the first 3 years of age. Vitamin D, which is a neuro-hormone with pleiotropic biological activities may modulate the immune response by alleviation, and stimulation of Th1 and Th2 cell proliferation, respectively, that influence the stimulation, synthesis, and secretion of both pro and anti-inflammatory cytokines. In this study we aimed to shed light on the levels of vitamin D in children with different episodes of tonsillitis in association with levels of interleukins (TNFα, IL-2, IL-4, IL-10). Blood samples were collected from 48 participants in 3 groups: control, acute tonsilliti

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
Study ABO/Rh system with Endothelial Inflammatory Factors in Iraqi Arab Female with Diabetes Mellitus Type II
...Show More Authors

Diabetes mellitus type II is a disorder of metabolism and complex diseases affected by genetic environmental factors and associated with inflammation. The symptoms of type II diabetes develop gradually, which are associated with increased blood concentration of marker of the endothelial inflammatory factors. The expression of adhesion molecules, including E-selectin, intracellular adhesion molecule-1(ICAM-1) and vascular cell adhesion molecule-1 (VCAM-1) on the surface of vascular endothelial cells to help leukocyte stick to other surrounding tissues. Many researchers have made attempts to determine the significance of particular ABO phenotype for the susceptibility to diseases. Many reports show a strong association with the ABO blood grou

... Show More
View Publication Preview PDF
Crossref (1)
Crossref