Preferred Language
Articles
/
VhdFx40BVTCNdQwCmhuL
Mandibular war injuries caused by bullets and shell fragments: a comparative study
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
(دراسة تحليلية): ( A field study )
...Show More Authors

The research aimed to identify the effects of the modern of technology on translating the media term from English language to Arabic. and try to identify the use of the impact of foreign media terminologies on the Arabic media term, and to know the effect of the translation process on Arabic media terminologies.

This research is considered an analytical study by using survey study for 111 items and the results for the study as following:

1.High percentage of the (use of foreign terms work to low the level of production) was (68.13%) and average 3.55

2.The percentage of (The multiplicity of translation of the foreign term into Arabic effects on the opinions and cognitive ideas of the Arab researcher and affects the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal: Ibn Al-haitham Journal For Pure And Applied Sciences
A Study the effect the direction of the distribution of lighting to improve Images in different lighting by using technique adaptive histogram equalization
...Show More Authors

Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Studying the Crystal Structure, Topography, and Anti-bacterial of a Novel Titania (TiO2 NPs) Prepared by a Sol-gel Manner
...Show More Authors

In this research, titanium dioxide nanoparticles (TiO2 NPs) were prepared through the sol-gel process at an acidic medium (pH3).TiO2 nanoparticles were prepared from titanium trichloride (TiCl3) as a precursor with Ammonium hydroxide (NH4OH) with 1:3 ratio at 50 °C. The resulting gel was dried at 70 °C to obtain the Nanocrystalline powder. The powder from the drying process was treated thermally at temperatures 500 °C and 700 °C. The crystalline structure, surface morphology, and particle size were studied by using X-ray diffraction (XRD), Atomic Force Microscopy (AFM), and Scanning Electron Microscope (SEM). The results showed (anatase) phase of titanium dioxide with the average grain size

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Al-adab Journal
La faculté articulatoire de l'apprenant irakien Dans une classe de français langue étrangère A l’université de Bagdad Etude comparative
...Show More Authors

Publication Date
Thu May 15 2025
Journal Name
Route Educational And Social Science Journal
A PSYCHOSOCIAL ANALYSIS OF APPROACHING ZANZIBAR BY TINA HOWE
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
Salt Distribution in a Soil Irrigated by Subsurface Emitter
...Show More Authors

The best design of subsurface trickle irrigation systems requires knowledge of water and salt distribution patterns around the emitters that match the root extraction and minimize water losses. The transient distribution of water and salt in a two-dimensional homogeneous Iraqi soil domain under subsurface trickle irrigation with different settings of an emitter is investigated numerically using 2D-HYDRUS software. Three types of Iraqi soil were selected. The effect of altering different values of water application rate and initial soil water content was investigated in the developed model. The coefficient of correlation (R2) and the root-mean-square error (RMSE) was used to validate the predicted numerical res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Tagmemic Analysis of English and Arabic Praise Poetry: A Contrastive Study
...Show More Authors

 This research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions:

  1. Is it possible to examine praise poetry as a tagmeme?
  2. Is this analysis of great help in teaching English and Arabic to students in the College of Education?

           The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9.

   &nbs

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 17 2021
Journal Name
7th International Conference On Multidisciplinary Sciences (7th Icomus)
A Critical Pragmatic Study of Sarcasms in American and British Interviews
...Show More Authors

APDBN Rashid, 7th International Conference on Multidisciplinary Sciences (7th ICOMUS), 2021

View Publication
Publication Date
Thu Apr 10 2025
Journal Name
University Of Baghdad
Decolonizing Trauma and Cocooning Identity: A Study in Selected Postcolonial Plays
...Show More Authors

The concept of decolonization of trauma has intrigued researchers for years due to its prolonged effect on personal and cultural levels. The process of intellectual decolonization involves defensive survival mechanisms, such as cultural rituals using traditional practices, nostalgic dialogues that idealize memories and recollections, and conversations about identity to navigate postcolonial trauma displacement. Symbolic connections evoke strong emotional responses, bridging the gap between the characters‘ physical dislocation and their imaginary homeland. Cocooning identity represents a space where a multidimensional self emerges—one that holds the victim of trauma, the survivor who endures, and the narrator, who constructs an idealized

... Show More