Preferred Language
Articles
/
dheKPo8BVTCNdQwCyWUV
A Lexical and Syntax Checker Tool for the Hyper Text Markup Language
...Show More Authors

Crossref
View Publication
Publication Date
Thu Feb 12 2026
Journal Name
Journal Of The College Of Basic Education
A comparative study between students of smokers and non-smokers in endurance antenna
...Show More Authors

Subjects took physical fitness for health imposed on the area of research that have become an important and clear answer to the many problems resulting from the nature of dealing with modern life current actions that were needed to be hours of manual work has become accomplished by modern technology circumstance minutes, and mediated equipment And machinery. The lack of traffic rights and further burdens the intellectual and psychological pressures and the typical method of work has led to the identification of kinetic activity, thereby threatening public health in many ways stands at the forefront of these threats the problem of smoking, which causes many types of cancers, notably lung cancer. The most important reasons that led to This dr

... Show More
View Publication
Publication Date
Mon Sep 14 2015
Journal Name
Day 2 Tue, September 15, 2015
Modeling and History Matching of a Fractured Reservoir in an Iraqi Oil Field
...Show More Authors
Abstract<p>In recent years the interest in fractured reservoirs has grown. The awareness has increased analysis of the role played by fractures in petroleum reservoir production and recovery. Since most Iraqi reservoirs are fractured carbonate rocks. Much effort was devoted to well modeling of fractured reservoirs and the impacts on production. However, turning that modeling into field development decisions goes through reservoir simulation. Therefore accurate modeling is required for more viable economic decision. Iraqi mature field being used as our case study. The key point for developing the mature field is approving the reservoir model that going to be used for future predictions. This can </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluation of Anxiety and Depression among a Sample of Hypothyroidism-Treated Iraqi Patients
...Show More Authors

Background: Hypothyroidism is the most prevalent thyroid disorders worldwide.  Hypothyroidism manifestations are wide spectrum, affecting various systems in human body including the nervous system. Hypothyroidism can cause neuropsychiatric symptoms such as anxiety, depression and diminishing in attention, memory and executive function. Aim: to investigate the level of anxiety and depression in patients with hypothyroidism receiving levothyroxine treatment. Method: a cross-sectional study was conducted at Baghdad Center for Nuclear Medicine and Radiation Therapy from March to June 2022. The study population included patients of both genders, aged 18-65 years, diagnosed with hypothyroidism, were receiving levothyroxine treatment and

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jul 01 2025
Journal Name
Mastering The Minds Of Machines
Future Computational Power of AI Hardware: A Comparative Analysis of GPUs and TPUs
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 18 2023
Journal Name
مجلة الدراسات المستدامة
A Review article:Diversity of fish in Iraqi waters and some factors affecting them
...Show More Authors

Rivers Tigris and Euphrates, as well as the wetlands in southern Iraq and the Diyala River, were all included in the evaluation of earlier studies on the variety and factors impacting fish in Iraqi waters. Different studies documented different types, and the number of species recorded varied between the studies, which could be explained by the registration of some species, synonyms, differs from the registration of some species with synonymous names By mistake, as well as recording new species in times that followed some previous studies, Also, the difference in some factors, including the pollution of some waterways, leads to a difference in the existing species, so we find the presence of species that are tolerant of pollution. There are

... Show More
Publication Date
Wed Jul 31 2024
Journal Name
Cureus
Neuro-Ophthalmic Manifestations of Carotid Cavernous Fistulas: A Systematic Review and Meta-Analysis
...Show More Authors

View Publication
Crossref (4)
Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Aug 11 2022
Journal Name
Arabian Journal For Science And Engineering
Synthesis and Characterization of Novel Nano Azo Compounds as a New pH Sensor
...Show More Authors

View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Applied Nursing Research
Examining perceived and actual diabetes knowledge among nurses working in a tertiary hospital
...Show More Authors

View Publication
Scopus (30)
Crossref (31)
Scopus Clarivate Crossref