Preferred Language
Articles
/
Lhd7cJIBVTCNdQwCkbA7
نسبة مساهمة التدفق النفسي في بعض مهارات الجمناستك الإيقاعي و فعالية رمي الثقل بالساحة و الميدان
...Show More Authors

View Publication
Publication Date
Wed Aug 30 2023
Journal Name
Baghdad Science Journal
Hepatocellular Carcinoma Prediction and early Diagnosis of Hepatitis B and C viral infection using miR-122 and miR-223 in a sample of Iraqi patients.
...Show More Authors

Hepatocellular carcinoma (HCC) is the third most common cause of cancer-related death. Therefore, it is critical for researchers to understand molecular biology in greater depth.  In several diseases including cancer, abnormal miRNA expression has been linked to apoptosis, proliferation, differentiation, and metastasis. Many miRNAs have been studied in relation to cancer, including miR-122, miR-223, and others. Hepatitis B and C viruses are the most important global risk factors for HCC. This study is intended to test whether serum miRNAs serve as a potential biomarker for both HCC and viral infections HBV and C. The expression of miRNA in 64 serum samples was analyzed by RT-qPCR. Compared to healthy volunteers, HCC patients' sera expre

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Psychological Pollution
...Show More Authors

The psychological pollution term comes from the realism that we live in its world. This
realism threatens our privet and the identity of our civilization. There is complete believe that
the literature of psychological pollution is insufficient to cover the whole horizons of this
term.
The psychological pollution has its root in the theories of the development of humanities
within the organization of the history. Some of these theories are the exceptional cultural
theory, the faithfulness theory and the integration theory and the identity losing.
The psychological pollution handles several concepts such as the engagement, the social
decay and the concept of cultural invasion.

View Publication Preview PDF
Publication Date
Sun Nov 04 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
MEASURING OBESITYLEVEL BY BIO-ELECTRICAL IMPEDANCE ANALYSIS TECHNIQUE AND COMPARED TO TRADITIONAL METHODS: MEASURING OBESITYLEVEL BY BIO-ELECTRICAL IMPEDANCE ANALYSIS TECHNIQUE AND COMPARED TO TRADITIONAL METHODS
...Show More Authors

This study aimed to determine obesity level of some population in Baghdad by using Bio-electrical impedance analysis (BIA) and compared with anthropometric measurements such as body mass index (BMI), waist circumference (WC) and waist-to-hip ratio (WHR). Statistical analysis results of linear correlation coefficients for obesity indicators showed that BIA correlation 0.92 was most significant and reliable for obesity measurement.

Results of BIA method for age group 20-29 years showed that 44.4% of females were healthy body while 37.8% of males suffer from increased body fat. Results of age group 30-39 year showed that 32.6 of females were in healthy body and 42% of males were obese. In case age group 40-4

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Lemon juice antioxidant activity against oxidative stress
...Show More Authors

This study is conducted to evaluate the therapeutic and antioxidant effect of lemon juice on some hematological and biochemical parameters. Thirty female mice used in this study were exposed to oxidative stress through giving them hydrogen peroxide in drinking water for 30 days. Animals randomly distributed over 3 groups, each group contained 10 animals and treated as follows: T1 control group (drinking distilled water only), T2 (0.75% hydrogen peroxide in drinking water) and T3 (0.75% hydrogen peroxide in drinking water with daily drenching with 1 mL lemon juice). At the end of the experiment, blood samples were collected from animals for evaluating the following hematological and biochemical parameters: Haemoglobin concentration (Hb),

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Tagmemic Analysis of English and Arabic Praise Poetry: A Contrastive Study
...Show More Authors

 This research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions:

  1. Is it possible to examine praise poetry as a tagmeme?
  2. Is this analysis of great help in teaching English and Arabic to students in the College of Education?

           The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9.

   &nbs

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
The concept of physical, psychological and social self with the kindergartens
...Show More Authors

The concept of self is considered one of the important dimensions in the human personality, because feeling of self is an important characteristic in this phase from the psychological point of view.

The first source which forms the concept of self is the physical image, where the built and appearance of the body is considered among the vital matters which determine the person's image of himself/herself. 

The current research aims to:

1) Identify the level of physical self concept at the kindergarten children.

2) Identify the level of psychological self concept at the kindergarten children.

3) Iden

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
On Faintly θ- Semi-Continuous and Faintly δ-Semi-Continuous Functions
...Show More Authors

      Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly  S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Jan 05 2019
Journal Name
Journal Of Planner And Development
التشكيل الحضري و البصري للمدينة منطقة الدراسة مدينة بلدروز
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Effect of Genderism on the Process and the Product of Translation
...Show More Authors

    Many studies have been made and still concerning the field of translation. Since the mid-90's a considerable amount of researches has tackled the problem of gender and its effect on the process and the product of translation. Simon (1996, p 508) points out that when comparing women and men as translators and writers through history, women seem to be the weaker side. This paves the way to feminist movements which produce prominent studies concerning gender as a concept and translator's gender as practice on the quality and the accuracy of the translation.           

     Flotow (in Meschia, 2012, p 1-4) outlines several issues that can be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref