In spite of the contemporary development over the world in pertaining of modernization and its differences about the transformation of the knowledge but, the important instrument to transfer the thoughts and information did not have change except the language. So the evolutionary process became as a torrent or fusillade above the cliff which drifted anything. So that the objective inquiry and impressed with varieties of development the casement to evaluate the linguistic or re - correction highlight article in order to preserve on the origins of the language and its sobriety.
Today, we have different correspondence and social media as Email, Website, an another of connection on the Internet, which resembled among the various societies. Furthermore, it had been given up the form of assessment within its linguistic origins that need accuracy and precise in right Arabic words.
Finally, the process of research in exploring the gravity of language to address the specialization and the responsibility of spread an important language and means of maintaining all knowledge fields in language.
In this work, a series of new maleimides linked to substituted benzothiazole moiety were synthesized. Synthesis of these new cyclic imides were performed via three steps, the first one involved preparation of a series of 2-aminobenzothiazole substituted with different substituents via reaction of different primary aromatic amines with ammonium thiocyanate and bromine in glacial acetic acid. The prepared 2- amino benzothiozoles were introduced in the second step in reaction with maleic anhydride producing a series of N-(substituted benzothiazole-2-yl) maleamic acids.The resulted maleamic acids were dehydrated in the third step via treatment with acetic anhydride and anhydrous sodium acetate to afford a series of the desirable N-(substitu
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreThe partial level density PLD of pre-equilibrium reactions that are described by Ericson’s formula has been studied using different formulae of single particle level density . The parameter was used from the equidistant spacing model (ESM) model and the non- equidistant spacing model (non-ESM) and another formula of are derived from the relation between and level density parameter . The formulae used to derive are the Roher formula, Egidy formula, Yukawa formula, and Thomas –Fermi formula. The partial level density results that depend on from the Thomas-Fermi formula show a good agreement with the experimental data.
Background: This study aimed to find whether there is a relation between the mesio-distal crown diameters of the deciduous second molars and the permanent first molars in an Iraqi sample from Baghdad city. Material and methods: The sample consisted of 54 Iraqi children aged 8-9 years at the mixed dentition stage. The measurements included the mesio-distal crown width of the deciduous second molars and the permanent first molars on the study casts using digital sliding vernier. Results: The results revealed absence of the side difference of the widths of teeth measured. High significant gender difference was detected for the permanent first molars and the deciduous second molars except mandibular permanent first molar. On the other hand, hig
... Show Moreسبع مسائل في احسن الوسائل للسياسة العراقية
The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreIn this paper, some relations between the flows and the Enveloping Semi-group were studied. It allows to associate some properties on the topological compactification to any pointed flows. These relations enable us to study a number of the properties of the principles of flows corresponding with using algebric properties. Also in this paper proofs to some theorems of these relations are given.
Background: Acute appendicitis is a common surgical
problem that is associated with an acute-phase reaction.
Previous studies have shown that cytokines and acutephase proteins are activated and may serve as indicators for
appendicitis.
Objective: The aim of this study was to evaluate of serum
levels of interleukin-6 (IL-6) in correlation to the severity
to acute appendicitis.
Methods: This is a prospective study from December 2008
to March 2009 of patients who had appendectomy in
Department of Surgery, Al-Kindy Teaching Hospital -
Baghdad/Iraq. Serum for estimating levels of interleukin-6
(IL-6) was taken pre-operatively. Depending on the
macroscopic evidence during the operation and the
histopathol
This research focuses on the services provided by news websites (IMN, Youm7, Huffington Post Arabic) to its audience of Internet users, as well as materials posted through its pages, trying to monitor and explain them to identify their types & features, and it›s functions, whether informational or non-informational, to know the technical potential of each of the news sites, with the entry of the latest technology information. The research used the analysis method to achieve the research objectives within the period from 1/1 to 31/1/2017. The researchers used the content analysis tool as a research tool to analyze the news sites and to know the services they provide through their pages. The research was divided into three parts, the
... Show More