Preferred Language
Articles
/
UBfCJpEBVTCNdQwC7pNj
A hybrid approach based on multiple Eigenvalues selection (MES) for the automated grading of a brain tumor using MRI
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
(The role of the Security Council in Managing international crises (The Libyan crisis as a model
...Show More Authors

The Security Council has an active role in addressing international crises and dealing with their causes. The Libyan crisis is one of the most important real tests of the Security Council and its role in maintaining international peace and security, as the Council has proven so far an ineffective role in resolving the crisis and dealing withtheir causes, which has prolonged its duration and increased its complexities and dangerous repercussions, perhaps the most prominent of which is the threat of the recently achieved cease-fire and the formation of a new transitional government led by Abdel Hamid al-Dabaiba, the growing significant obstacles facing the political process, foremost of which is the continued presence of foreign forces , m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
The Conceptual Representations of the Jewish Personality in the International Cinema (Munich film as a model)
...Show More Authors

This study deals with the intellectual representations whose intellectual systems are incarnated in the Jewish personality, which is considered one of the complex intellectual systems that has caused controversy throughout the ages because of the ambiguity due to the religious and psychological factors that were reflected directly and strongly on the intellectual structure of the Jewish community in general and the Jewish - Zionist personality in particular, in an attempt (to create new dimensions embodied by intellectual representations of a human nature embodied by what that - peaceful - religiously oppressed - psychologically and socially isolated character presents, because of the curse of the peoples of the world that was a cause fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 22 2026
Journal Name
Journal Of Physical Education
The Effect of Exercises Using Maximum Strength Assisting Training Apparatus On Some Working Muscles' Electric Activity During Bench Press For Physical Strength Athletes Of Baghdad Clubs
...Show More Authors

View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
ADVERTISING CAMPAIGNS IN TV CHANNELS : (A Research Drawn from A Master Thesis)
...Show More Authors

Television culture has become the most dangerous of our time. It manipulates with minds and hearts together; and forms consciousness. It transforms societies into actual forces rejecting certain principles by guiding the media landscape through visible connotations acceptable to the public; or provokes the citizen against elements that put a burden on the viewer or the public in order to create a positive reaction to the subject of combating terrorism by combining these ads in line with what the public wants of security and tranquility and a decent living after suffering from terrorism in the past years.

Therefore, this research deals with television advertisements as one of the most important fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Al-mansour Journal
Biometrics Systems Challenges in a Post-COVID-19 Pandemic World: A review
...Show More Authors

One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
A study of some of the of the Verbs’ Arabic Roots in the stories of Osman Ceviksoy Like a Voice in The Dark.: Osman Çeviksoy'un "Karanlıkta Ses Gibi" Başlıklı Öykü Kitabında Arapça Kökenli Türkçe Fillerin İncelenmesi
...Show More Authors

Due to the Geographical links, language is one of the multiple affects among Arabs and Turks. As the different studies demonstrate, Turkish contains many words derived from other languages, yet Arabic remains the language that has great affects on Turkish. Unlike Turkish language, Arabic is a derivative language that requires no suffixes. Thus, Arabic verbs are tuned into Turkish verbs by adding auxiliary verbs. The present study traces some of the Turkish compound words of Arabic roots with an explanation that shows the Auxiliary added to form the Turkish verb as found in the stories of Otman Chevek Sawy’s Like A voice in the Dark. The conclusion sums up the findings of the study illustrated by numbers.

Özet<

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Iraqi Journal Of Physics
Investigation of Beta - irradiation effects on the microstructure of Low Density Polyethylene (LDPE) using (PALT)
...Show More Authors

Beta-irradiation effects on the microstructure of LDPE samples have been investigated
using Positron Annihilation Lifetime Technique (PALT). These effects on the orthopositronium
(o-Ps) Lifetime t3, the free positron annihilation lifetime 2 t , the free-volume
hole size (Vh) and the free volume fraction (fh) were measured as functions of Beta
irradiation - dose up to a total dose of 30.28 kGy.
The results show that the values of t3, Vh and fh increase gradually with increasing Beta
dose up to a total dose of 1.289 kGy, and reach a maximum increment of 17.4%, 32.8% and
5.86%, respectively, while t2 reachs maximum increment of 211.9% at a total dose of 1.59
kGy. Above these doses, the values show nonlinear changes u

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Synthesis and Characterization of some New 1,3,4-Oxadiazole derivatives based on 4-amino benzoic acid
...Show More Authors

Various of 2,5- disubstituted 1,3,4-oxadiazole (Schiff base, ?- lactam and azo) were synthesized from 2,5-di (4,4?-amino-1,3,4-oxadiazole which usequently synth-esized from mixture of 4- amino benzoic acid and hydrazine arch of polyphosphorus acid. The synthesized compounds were cherecterized by using some spectral data (UV, FT-IR , and 1H-NMR)

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon May 18 2009
Journal Name
Journal Of Global Pharma Technology
Synthesis, Thermal and Electrochemical Properties of Four New Bis Oxadiazole Copolymers Based on Azo Monomer
...Show More Authors

Four new copolymers were synthesized from reaction of bis acid monomer 3-((4-carboxyphenyl) diazenyl)-5-chloro-2-hydroxybenzoic acid with five diacidhydrazide in presence of poly phosphoric acid. The resulted monomers and copolymers have been characterized by FT-IR, 1H-NMR, 13C-NMR spectroscopy as well as EIMs technique. The number averages of molecular weights of the copolymers are between 4822 and 9144, and their polydispersity indexes are between 1.02 and 2.15. All the copolymers show good thermal stability with the temperatures higher than 305.86 C when losing 10% weight under nitrogen. The cyclic voltammetry (CV) measurement and the electrochemical band gaps (Eg) of these copolymers are found below 2.00 ev.

Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref