Preferred Language
Articles
/
bsj-2453
Morphological and Histological Study of the Forebrain (Cerebrum) in a Wild Bird Species (Columba livia domestica) (Gmelin, 1789)
...Show More Authors

The present study deals with the morphological and histological aspects of the forebrain(Cerebrum) in the Columba livia domestica (Gmelin, 1789) to identify the histoarchitecture of its layers. This bird' has a large head found as perpendicular to the longitudinal axis. The morphological results reveal that for brain (Cerebrum) pear shaped, its outer surface is smooth without folds or deep grooves. Cerebrum is made up of two regions, the Pallium and the Subpallium. The Cerebral cortex includes four layers of hyperpallium (Wulst) , Dorsolateral corticoid area (CDL), Hippocampus, Piriform cortex. The internal cortex of cerebrum consists of Dorsal Ventricle ridge which includes the mesopallium, nidopallium, and archospallium. All these regions includes Pyramidal cells, which have different sizes and densities, as well as many other neurons and Neuralgial. The Subpallium is divided to Striatum which is consisted of nerve fibers of nerve cells and the Palldium, which is the deepest part of the brain with light- color.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 17 2023
Journal Name
Journal Of Engineering
A Simulation of Core Displacement Experiments for the Determination of the Relative Permeability
...Show More Authors

Computations of the relative permeability curves were made through their representation by two functions for wetting and nonwetting phases. Each function contains one parameter that controls the shape of the relative permeability curves. The values of these parameters are chosen to minimize an objective function, that is represented as a weighted sum of the squared differences between experimentally measured data and the corresponding data calculated by a mathematical model simulating the experiment. These data comprise the pressure drop across core samples and the recovery response of the displacing phase. Two mathematical models are constructed in this study to simulate incompressible, one-dimensional, two-phase flow. The first model d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 21 2020
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A CONTRIBUTION TO THE CHECKLIST OF THE JUMPING SPIDERS (ARANEAE: SALTICIDAE) OF ARMENIA
...Show More Authors

The paper presents an annotated checklist of the Salticidae of Armenia. This study was carried out in 2019-2020 in order to provide an inventory of the Salticidae fauna. Thirteen species are reported for the Armenian fauna for the first time: Afraflacilla epiblemoides (Chyzer, 1891); Aelurillus v-insignitus (Clerck, 1757); Asianellus festivus (C. L. Koch, 1834); Heliophanus dubius C. L. Koch, 1835; Heliophanus kochii Simon, 1868; Heliophanus tribulosus Simon, 1868; Heliophanus curvidens (O. Pickard-Cambridge, 1872); Macaroeris nidicolens (Walckenaer, 1802); Pellenes diagonalis (Simon, 1868); Pellenes geniculatus (Simon, 1868); Pellenes seriatus (Thorell, 1875); Pellenes tripunctatus (Walckenaer, 1802) and Phlegra fasciata (Hahn, 1826).

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The role of Open Budget in achieving of the transparency and responsibility and Reflect it on the administrative and financial corruption
...Show More Authors

Abstract

The open budget means everyone in the society can get information about the government budget in order to watch the governmental works. The aim of the research is to study the concepts of open budget, its advantage, limitations, role of supporting the transparency and questioning the administrative and financial corruption. Thus reflects positively on the national economy by providing governmental information to all users whether they are individuals or belong to the political class, or any other governmental or nongovernmental organizations which are interested in these information.

In order to achieve the objectives of the research aims, we make questionnaire to see aca

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 02 2013
Journal Name
Iraqi Medical Journal
Etiology and Antibiotic Sensitivity for Otitis Media in A Central Pediatric Teaching Hospital.
...Show More Authors

Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Al Adab Journel
Gender Struggle and Women's Predicament in Tennessee Williams' A Street Car named Desire
...Show More Authors

Abstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit

... Show More
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Applied Nursing Research
Examining perceived and actual diabetes knowledge among nurses working in a tertiary hospital
...Show More Authors

View Publication
Scopus (30)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
Women's Rape in Iraq between Legislation and Social Norms: A Critical Discourse Analysis
...Show More Authors

Recently, women's rape has been a pervasive problem in the Iraqi society. Thus, it has become necessary to consider the role of language and its influence on the common beliefs and opinions about rape in the Iraqi society. Thus, taking into consideration the critical role of language and its impact on the perception of human reality and the social development based on people's beliefs and principles of life has become highly indispensable. Therefore. The aim of this article is to address this problem critically from legislation and social norms in NGOs' reports (2015; 2019) with reference to some provisions from the Iraqi Panel Code (1969; 2010). Therefore, the researchers examine the discursive strategies and ideological viewpoints in t

... Show More
View Publication Preview PDF
Crossref