Preferred Language
Articles
/
_haxuYsBVTCNdQwCaNca
MONKEYPOX A NEW PANDEMIC DISEASE: IMPLICATIONS FOR CLINICAL PRACTICE AND PUBLIC HEALTH EDUCATION. A REVIEW
...Show More Authors

Publication Date
Sat May 29 2021
Journal Name
Journal Of Legal And Political Thought
The Possibility of Compensation for the Loss of View Caused by Public Projects – A Legal Study in Light of the Approach of U.S. Courts
...Show More Authors

Despite the great economic and commercial importance given to real estate by virtue of its view of the landscape or public roads, US courts have differed in their position on compensation for damages resulting from blocking that view or vision by public projects. Some courts compensated for such damages, other courts approved such compensation. Hence, this research came to shed light on the extent of the possibility of compensation for blocking the view or vision as a result of public projects, and the research has supported us with many judicial decisions.

View Publication
Publication Date
Mon Sep 30 2024
Journal Name
Journal Of Obstetrics, Gynecology And Cancer Research
Effect of a Nutritional Education Program on Mother Knowledge Regarding Their Children Nutritional Status
...Show More Authors

Scopus (1)
Scopus
Publication Date
Thu Apr 14 2016
Journal Name
Bio--genetics Journal
Correlation of Her-2/neu gene amplification by FISH and CISH with clinicopathological parameter of Iraqi breast carcinoma patients at central public health laboratories
...Show More Authors

The objective of the study: is to investigate the correlations between the HER2 neu gene status with the clinicopathological parameters of infiltrative breast carcinoma. A total of seventy four Iraqi breast cancer patients were collected from one center (Department of Public Health) paraffin blocks were collected from histopathology department central public health laboratories, Bagdad, Iraq from 2014-2015. The cases which has been taken included invasive ductal and invasive lobular carcinoma type Women age were ranged from 24-80 years old. Evaluation of Her-2/neu gene amplification status was done using FISH and CISH techniques that showed a significant correlations with clinicopathological parameters.

Publication Date
Fri Jun 20 1930
Journal Name
College Of Islamic Sciences
Public leave for modernists Its benefits and the judgment of its operation
...Show More Authors

2 The benefit of the leave of our time is the leakage and inclusion in the series of narrators of modern.
3 The leave is therefore permissible to narrate the hadeeth or other sciences from a sheik or sheiks, and not
the talk.
4 It is not necessary that the grantee of the leave has studied the student who is the holder of the leave.
5 - in which a great meaning is the sense of the recipient seeking blessing through the link
With attribution to our master Muhammad peace be upon him.

View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
A New Derivatives of Benzodiazepine, Imidazole, Isatin, Maleimide, Pyrimidine and 1,2,4-Triazole: Synthesis and Characterization
...Show More Authors

The synthesis of new benzodiazepine, imidazole, isatin, maleimide, pyrimidine and 1,2,4-triazole derived from 2-amino-4-hydroxy-1,3,5-triazine, via its cyclocondensation reaction with different organic reagents, is described. FT-IR, 1H-NMR and as well as 13C-NMR spectra disclosed the structures of the precursors and heterocyclic derivatives formed.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Plant Archive
A new species of genus stachys L. (Lamiaceae) in Iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Communicative Integration in New Media: Building a Communicative Model
...Show More Authors

The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref