Preferred Language
Articles
/
QRe7h5IBVTCNdQwC77MF
Neuro-Ophthalmic Manifestations of Carotid Cavernous Fistulas: A Systematic Review and Meta-Analysis
...Show More Authors

Clarivate Crossref
View Publication
Publication Date
Tue Aug 07 2018
Journal Name
Oral And Maxillofacial Surgery
Mandibular war injuries caused by bullets and shell fragments: a comparative study
...Show More Authors

View Publication
Scopus (4)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Ghrelin and Obestatin Levels as a Novel Marker in Iraqi Obese Children
...Show More Authors

Obesity is an escalating health problem in developing countries. One to ten children worldwide are overweight in a report showed by the International Obesity Task Force. Ghrelin, orexigenic peptide, has 28 amino acids, it is considered the greatest remarkable promotion in the last two decades for understanding the physiological changes of action regu­lating food intake and hunger. Obestatin is a 23-amino acid peptide nearly connected to ghrelin that secures from substitutio

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Tue Aug 07 2018
Journal Name
Oral And Maxillofacial Surgery
Mandibular war injuries caused by bullets and shell fragments: a comparative study
...Show More Authors

View Publication
Scopus (4)
Crossref (7)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The impact of the integrative role of the Business Intelligence system and Knowledge Conversion Processes in Building a learning organization A field research in Korek telecom company in Baghdad city
...Show More Authors

Purpose:  The research aims to explore the impact Business Intelligence System (BIS) and Knowledge Conversion Processes (KCP) in the Building Learning Organization (LO) in KOREK Telecom Company in Baghdad city.

Design/methodology/approach: in order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then has tested the search in the telecommunications sector, representatives of one of the telecommunications companies in Baghdad city, has therefore chosen KOREK Telecom company as a sample for research, and the choice was based on the best standard international companies to serve mobile communications in terms o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
‘There is no place like home’: A Comparative Study of the Meaning of Home in The Wonderful Wizard of Oz and Peter and Wendy
...Show More Authors

The Wonderful Wizard of Oz and Peter and Wendy present universal ideas that exist in all times, despite being written in the beginning of the 20th century. Among the most significant ones is the concept of “home”. The article discusses the essentiality of the idea of “home” where the identity of an individual shapes, and where one’s spiritual, psychological, and physical being develop. It also studies the attitudes of each protagonist towards the concept of ‘home’ based on their understanding of it and according to their gender differences. The characters in both stories tread on the path of perplexity between leaving their homes and returning to them. Peter’s world is the world of imagination while Doro

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 10 2025
Journal Name
Al–bahith Al–a'alami
SOCIAL MEDIA AND ITS ROLE IN THE PRODUCTION AND NUTRITION OF CRISES: "ANALYTICAL STUDY OF A SAMPLE OF TWITTER DURING THE GULF CRISIS 2017"
...Show More Authors

Social networking sites have become very popular since the beginning of the current decade and have become linked to our daily life. We follow the news, Analyses  and opinions on the one issue in a way that attracts millions of users and the number grows every secon On Twitter, one of the most important social networking sites, all social groups rushed from the president to the last citizen to open accounts when they found themselves forced to do so .

During the recent Gulf crisis, Twitter was buzzing with Twitter, which achieved the largest circulation globally. Instead of serving the issue and directing it to serve the Arab interest, most of the publications were on th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Formulas The command and its style in Surat Al-Ma’idah is a rhetorical fundamentalist study.: The command and its style in Surat Al-Ma’idah is a rhetorical fundamentalist study
...Show More Authors

Research Summary :

      Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:

     This is a brief research that contained its two rudders the command and its Style in Surat Al-Ma’idah a fundamental rhetorical study, and the study clarified the meaning of imperative in both;  the Arabic  language and in the terminology of the fundamentalists and rhetoricians in a concise manner, and then indicated the imperative of the command , the true meaning, and the meanings interpretated as an  imperative form. I have mentioned some verses of Surat Al-Ma’idah, so what I have quot

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

 This paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors