Preferred Language
Articles
/
WxZj2IcBVTCNdQwCmmrR
Assessment of hypoxemia status by measuring serum level of hypoxia inducible factor 1 alpha in relation to tumor suppression protein p53, estradiol and tumor proliferation markers of breast cancer in Thi-Qar province/Iraq
...Show More Authors

Scopus Clarivate
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Build and Implemented Learning Package for Prolog Programming Language Using Visual Basic.Net 2010
...Show More Authors

E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 20 2023
Journal Name
2023 International Conference On Information Technology, Applied Mathematics And Statistics (icitams)
Hybrid Color Image Compression Using Signals Decomposition with Lossy and Lossless Coding Schemes
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Blockchain Technology and its Potential Effect on the Banking Industry (China Case Study)
...Show More Authors

The aim of the research is to investigate potential effects of the finance industry and block-chain to general business of financing in particular, as well as its shortcomings and difficulties. To answer the research questions, the researcher used the objective narrative-analytical descriptive approach and included a qualitative analysis of Blockchain technology. The process of Blockchain technology based on their industries, the authors were selected based on their reputation in the Blockchain field. The research found that Blockchain can improve the efficiency of the banking industry's various sections. It has the ability to upgrade and transfer wages across borders, financial reporting and compliance, as well as trade finance

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 11 2019
Journal Name
Journal Of The College Of Education For Women
The South Baghdad Electrical Station and its Environmental Impact on the Tigris River
...Show More Authors

The South Baghdad electrical station located on the eastern bank of the Tigris River south of Baghdad city was selected within the municipality of Karrada between  two  latitude ( 3315 , 33 0  18 )North  and  longitude ( 44 0  27 , 44 030 ) East . The purpose of the study is to determine the contribution of the station to the effect of pollution of the Tigris water by taking water samples at the station site and two sites, one before and the other after the station, distributed over time periods of three months between each sample of water and the beginning of August and November Shabat and Mayar and analyzed water samples physically, chemically and biologic

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
On Fully Stable Banach Algebra Modules and Fully Pesudo Stable Banach Algebra Modules
...Show More Authors

The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Iraqi Rural Singing and National Identity: مصطفى عباس السوداني-عبد الحليم أحمد حسن
...Show More Authors

Singing has significant importance being a major basis for the expressive and cultural production of the societies and a real companion that reflects their artistic career and is strongly connected to the reality of the peoples and the production of the individuals, who are geniuses of arts and culture.
Rural singing represents one of the most well-known artistic singing styles in Iraq, which truly embodied the Iraqi national identity. However, it remained confined to the countryside and did not spread due to the lack of mass media and the recording technologies at that time. It has been pure virgin singing art. The theoretical framework is divided into three axes:

• The Iraqi singing heritage in the twentieth century, a hi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Personal tax exemptions "a comparative study with some Arab and European system legislations
...Show More Authors

This research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.      

View Publication Preview PDF