Preferred Language
Articles
/
PBZdL4cBVTCNdQwC9TwZ
CFD Simulation of Heat Transfer Augmentation in Constant Heat-Fluxed Tube fitted with Baffled Twisted Tape Inserts
...Show More Authors

Publication Date
Tue Dec 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
STATUS OF COMMERCIAL FISH CATCH IN THE IRAQI MARINE WATERS, ARABIAN GULF
...Show More Authors

Commercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Annals Of Medicine And Surgery
Assessment of the difficulties in laparoscopic cholecystectomy among patients at Baghdad province
...Show More Authors

Scopus (7)
Scopus
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 30 2009
Journal Name
Al-kindy College Medical Journal
The impact of advancing age on total serum IgE in asthmatic patient
...Show More Authors
 

Abstract

The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Baghdad College Of Dentistry
In Vitro Comparative Assessment of Composite Nanoleakage Using Various Dentine Surface Treatments
...Show More Authors

Background: The treatment of dental tissues proceeding to adhesive procedures is a crucial step in the bonding protocol and decides the clinical success ofrestorations. This study was conducted in vitro, with the aim of evaluating thenanoleakage on the interface between the adhesive system and the dentine treated by five surface modalities using scanning electron microscopy and energydispersiveX-ray spectrometry. Materials and methods: Twenty five extracted premolars teeth were selected in the study. Standardized class V cavities were prepared on the buccal and lingual surfaces then the teeth divided into five main groups of (5 teeth in each group n=10) according to the type of dentine surface treatment that was used: Group (A): dentine was

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jan 11 2024
Journal Name
Научный Форум
Structural and semantic features of military metaphors in the modern Russian press
...Show More Authors

Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of The College Of Languages
A Phono-stylistic Analysis of Utterance Stress in Steve Harvey's talk show
...Show More Authors

patterns of utterance stress in discourse direct attention to specific themes and reactions, controlling the flow and coherence of conversation. this study examines the utterance stress in Steve Harvey's selected episodes from a phono-stylistic perspective. this study is hoped to improve understanding of linguistic mechanism in talk show communication, highlighting the importance of phonetic features in transmitting meaning and increasing broadcast conversation participation. the researcher concentrates on the types of focus functions of utterance stress of some episodes available on YouTube. to conduct the analysis, the researcher adopts (Carr, 2013; Davenport& Hannahs 2005) to analyze utterance stress and Leech and Short (2007

... Show More
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
The uses used in the political implications of Arabic-speaking foreign website
...Show More Authors

This research is intended to high light the uses of political content in foreign Arabic / speaking websites, such as “ CNN “ and” Euro News“, The research problem stems from the main question: What is the nature of the use of the websites in the political content provided through them? A set of sub-questions that give the research aspects and aims to achieve a set of objectives , including the identification of topics that included , the political content provided through , the sample sites during the time period for analysis and determine that the study uses descriptive research based on the discovery of the researcher, describing it accurately and defining the relations between the components.
The research conducted the des

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Economics And Administrative Sciences
Statistical Methods for Controlling the Quality of Crude Oil Products in Iraq
...Show More Authors

The purpose of this study is to measure the levels of quality control for some crude oil products in Iraqi refineries, and how they are close to the international standards, through the application of statistical methods in quality control of oil products in Iraqi refineries. Where the answers of the study sample were applied to a group of Iraqi refinery employees (Al-Dora refinery, Al-Nasiriyah refinery, and Al-Basra refinery) on the principles of quality management control, and according to the different personal characteristics (gender, age, academic qualification, number of years of experience, job level). In order to achieve the objectives of the study, a questionnaire that included (12) items, in order to collect preliminary inform

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
Evaluation of user interface designs in official websites "Fine Art Colleges Model"
...Show More Authors

I found that it does not meet some of the requirements, including browsing and organizing structural elements, which is something in which the researcher found a scope for research, and from here she can formulate the problem of her research with the following question: Is there an actual need to develop user interface designs in the websites of Iraqi colleges of fine arts? The research included four chapters (the first chapter - the research problem - the second chapter (theoretical framework), which included three sections, the first is to identify the user interface, the second topic is the structural elements, and the third topic includes the rules of interface design and the dimensions of interaction), as well as the third chapter i

... Show More
View Publication Preview PDF
Crossref