Preferred Language
Articles
/
bsj-545
The effect of unsecured use of chemical pesticides on the environment and health in Iraq
...Show More Authors

The wide use of pesticides in recent years leads to rapid distribution of these pollutants in the environment (air, water and soil).They were transported by means of air or water to biological ecosystems. They become more toxic through the processes of biological magnification while some of them persist for along period.The aim of this work is to show the negative effect that chemical pesticides causes, and in the same to show their side effect on the environment and health in Iraq. We could conclude that the bad use of these chemicals could cause an urgent impact now or in the future. Governmental offices dealing with these materials should take the right measures to minimize the danger and the misuse of these chemicals by seeking alternatives ways of control. That may be safer and has no haphazard effect on health and environment, keeping in mind that mass media of clarification of the danger of these pesticides is fundamental duty to keep better health and environment in Iraq.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
Aesthetics configuration in the Assyrian winged bull )An analytical study(
...Show More Authors

Subjected Find winged bull Assyrian monetary analysis in order to identify the formative relations in terms of percentages, movement and public swab for being aesthetic values ​​upon which the mechanisms of artistic composition, which did not give researchers artistic interest that affects the status of these sculptures and the like of the achievements of the Iraqi civilization in Assyria.

Resulting analysis to a number of the most important results, the percentages approved in the calculation of the parts to do with all when viewed status horizontal with a realistic formulas while in the case of considering frontally clear for Ras stylized proportions and head size larger in length, a ratio confirmed by previous studies, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 26 2021
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Three-dimensional printing applications in the neurosurgery: A pilot study
...Show More Authors

BACKGROUND: Three-dimensional (3D) printing is an evolving technology that has been used recently in a wide spectrum of applications. AIM: The objective is to evaluate the application of 3D printing in various neurosurgical practice. PATIENTS AND METHODS: This pilot study was conducted in the neurosurgical hospital in Baghdad/Iraq between July 2018 and July 2019. An X, Y, and Z printer was used. The working team included neurosurgeons, biomedical engineers, and bio-technicians. The procedure starts with obtaining Magnetic resonance imaging (MRI) or computed tomography (CT) scan in particular protocols. The MRI, and CT or angiography images were imported into a 3D programmer for DICOM images called 3D slice where these files con

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
Figurative Structuring Systems in the Optical Art: ندى عايد يوسف
...Show More Authors

Through the history of art movements, abstraction has been rotating between appearance and disappearance, mounting and stillness while its performances differed between reduction and simplification on the one hand and between the use of chromatographic and linear abstraction on the other. As a result, to what is mentioned, abstraction has appeared in many different artistic forms underlying the systematicity of the plastic art history.However, according to a contemporary point of view that comes up with the scientific revolution, the art of optical deceiving (illusion) appeared to find a hybrid art form that locates between the geometricity of abstraction and the scientific, visual and psychological foundations that are linked with the i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The Graphic privacy in vector graphics design for children's publications
...Show More Authors

         The graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Al-academy
Unconventional materials in the contemporary sculptural composition: علاء محسن كَبيّش
...Show More Authors

This study aimed to knowledge of the effects of the Traditional ore upon the structure of sculpture form, as well as to knowledge of new materials that was used for the contemporary sculpture. This study included four chapter: first chapter was specialized for methodical frame. such as problem of research. that it was abstracted by question about the reason that lead the sculptor to search from new raw to carry out his sculpture works? As well as the important of research and its limits was that define between year 1950 up to 2000. The second chapter included the theoretical field and previous studies, that formed from three researches, such as the fist about the materials, as it was considered master element at the sculpture formal. the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
A new vision for the classic in contemporary fashion designResearch
...Show More Authors

        fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages      The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
Ruling on dealing with Jews in Muslim countries
...Show More Authors

Praise be to God, who is satisfied with Islam as our religion, “He opened a clear conquest for us,” and whoever works with us through the Shari’ah works and protects us. And that our master and Mawlana Muhammad His servant and Messenger is a prophet who has been merciful and compassionate. "
And after:
The occupation of Iraq and the accompanying bone events, and the following severe obstacles, resulted in a set of problems that require legitimate stances, and satisfactory answers, remove confusion and delusion, amid the clash of opinions and contradictions of jurisprudence. Work and application.
Among the difficult problems that surfaced in light of the new political developments on the land of Iraq: (the ruling on dealing

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
Survey study on Cholera Disease in South Baghdad
...Show More Authors

The study includes collection of data about cholera disease from six health centers from nine locations with 2500km2 and a population of 750000individual. The average of infection for six centers during the 2000-2003 was recorded. There were 3007 cases of diarrhea diagnosed as cholera caused by Vibrio cholerae. The percentage of male infection was 14. 7% while for female were 13. 2%. The percentage of infection for children (less than one year) was 6.1%, it while for the age (1-5 years) was 6.9%and for the ages more than 5 years was 14.5%.The total percentage of the patients stayed in hospital was 7.7%(4.2%for male and 3.4%for female). The bacteria was isolated and identified from 7cases in the Central Laboratory for Health in Baghdad. In

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 18 2016
Journal Name
International Journal Of Applied Mathematical Research
On common fixed points in generalized Menger spaces
...Show More Authors

R. Vasuki [1] proved fixed point theorems for expansive mappings in Menger spaces. R. Gujetiya and et al [2] presented an extension of the main result of Vasuki, for four expansive mappings in Menger space. In this article, an important lemma is given to prove that the iteration sequence is Cauchy under suitable condition in Menger probabilistic G-metric space (shortly, MPGM-space). And then, used to obtain three common fixed point theorems for expansive type mappings.

View Publication
Crossref