Preferred Language
Articles
/
ijp-261
Temperatture esttiimattiion off EXDRA and SSUMI dwarff Nova systtems from spectroscopic data
...Show More Authors

The seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
The shield And its provisions in Islamic jurisprudence
...Show More Authors

Since I live in a society in which violence has become widespread, and killing among its own people flared up till they began to kill under the excuse of taking shelter, in these pages I would like to explain the status of taking shelter in the light of Islamic Law (Sharia), exploring scholars’ opinions in the legitimacy or illegitimacy of this issue according to the legal standards.
And, to acquaint people, and myself in the first place, with the true nature and the gravity of this issue; to expose it to those who are unaware of it; to remind those who are already aware of it. I would refute the fabrications, remove the suspicions which surround it untill it made the forbidden permissible; the wrong right. I would explain to those

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
Heretic rulings And related words in Islamic jurisprudence
...Show More Authors

How I was eager to research the ruling on three of the most dangerous types to Islam and Muslims (the heretic, the sorcerer, the innovator, and related terms).
Because it is the most dangerous deadly disease that destroys the hearts of Muslims, and may even expel a Muslim from the circle of Islam, and how many Muslims have done or committed such a thing without knowing it. Indeed, how many Muslims have left Islam and whose wife has abandoned him without realizing it, and among them are those who have committed it without knowing it. As well as related words associated with heresy.( )
Because people debated such matters between extremists and lenient ones, most of whom were extremists, and they did not reach a conclusion. So I decid

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of The College Of Education For Women
Deception in Amber Heard and Johnny Depp’s Trials
...Show More Authors

Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Pharmaceutical Sciences & Research
New Derivatives of Thiozolidinone, Synthesis and Characterization
...Show More Authors

The present work involved synthesis of new thiozolidinone derivatives,These derivatives could be divided into three type of compounds; quinolin-2-one[V]a,b ,Schiff bases[VI]a,b and imide compounds[VII]a-d. The reaction p-Hydroxyacetophenone with thiosemicarbazide led to formation thiosemicarbazon compound [II], the reacted of thiosemicarbazone with chloro acetic acid in CH3CO2Na led to yield 4- thiazelidinone compound[III] in addition, thiosemicarbazide was POCl3 to [III] give [IV] compound used intermediates to synthesis new compounds of reacted with two type of coumarin in glacial acetic acid to give quinolin-2-one[V]a,b, The later compound refluxing with different benzaldehyde in dry benzene and glacial acetic acid give Schiff bases[VI]a

... Show More
Preview PDF
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Lorenz model and chaos masking /addition technique
...Show More Authors

View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Biological Activity of Schiff Bases Chelates with Mn(II),Co(II),Ni (II),Cu(II) and Hg(II)
...Show More Authors

In this paper, some series of new complexes of Mn(II), Co(II), Ni (II) Cu(II) and Hg(II) are prepared from the Schiff bases (L1,L2). (L1) derived from 4-aminoantipyrine and O-phenylene dia mine then (L2) derived from (L1) and 2-benzoyl benzoic acid. Structural features are obtained from their elemental microanalyses, molar conductance, IR, UV–Vis, 1H, 13CNMR spectra and magnetic susceptibility. The magnetic susceptibility and UV–Vis, IR spectral data of the ligand (L1) complexes get square–planar and tetrahedral geometries and the complexes oflig and (L2) get an octahedral geometry. Antimicrobial examinations show good results in the sharing complexes.

View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Crossref
Publication Date
Tue Oct 15 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Combining Convolutional Neural Networks and Slantlet Transform For An Effective Image Retrieval Scheme
...Show More Authors

In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),

... Show More
Scopus (11)
Crossref (5)
Scopus Crossref
Publication Date
Mon Oct 22 2018
Journal Name
Journal Of Economics And Administrative Sciences
Measuring and analyzing the relationship between the volatility of US stock market indices and the volatility of oil prices
...Show More Authors

The volatility of the financial markets and the oil market plays a major role in influencing macroeconomic activity, as well as the high interaction between the both markets and the remarkable sensitivity to their each other fluctuations which cause the undesirable impact on other economic sectors as an expected result due the mentioned interaction.

The study aimed to analyze the relationship between the volatility of the major US market indices represented by the DJIA index, S & P500, due to their comprehensiveness of the financial market, as they summarize the performance of the entire US market which is the largest economy in the world, as well as the difference in the calculation mechanism, and oi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Investigation of the association of AGTR1 A1166C rs5186 and FTO rs9939609 polymorphisms with the obesity in children and adolescents
...Show More Authors

Obesity is a risk factor for a number of chronic conditions. Obesity is clinically defined using the body mass index (BMI) as weight in kg divided by (height)2 in m2 correlated with obesity. Currently, genetic markers of obesity are being studied. This study focused on the association between the angiotensin II receptor AGTR1 gene (A1166C) and fat mass and obesity-associated protein also known as alpha-ketoglutarate-dependent dioxygenase (FTO) (rs9939609) in obese children and adolescents patients in Rostov region, Russia.  Five-hundreds of Russian nationality child and adolescent were recruited for the obesity-control studies. The relationship between the A1166C polymorphism of the AGTR1 gene in

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref