Preferred Language
Articles
/
jbcd-526
The relation between the mesio-distal crown widths of the deciduous second molars and the permanent first molars
...Show More Authors

Background: This study aimed to find whether there is a relation between the mesio-distal crown diameters of the deciduous second molars and the permanent first molars in an Iraqi sample from Baghdad city. Material and methods: The sample consisted of 54 Iraqi children aged 8-9 years at the mixed dentition stage. The measurements included the mesio-distal crown width of the deciduous second molars and the permanent first molars on the study casts using digital sliding vernier. Results: The results revealed absence of the side difference of the widths of teeth measured. High significant gender difference was detected for the permanent first molars and the deciduous second molars except mandibular permanent first molar. On the other hand, high significant difference was found between the maxillary and mandibular arches for the permanent first molars and the deciduous second molars except for the permanent first molar in males. A direct strong significant correlation was found between the width of the permanent first molars and the deciduous second molars. Conclusion: The findings of the present study may be used as predictive factor for tooth – jaw disharmony and the possibility for the crowding in the future.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
دراسات قانونية
The Legal Nature of the Build-Operate- transfer-Ownership Contract (B.O.T.)
...Show More Authors

The legal nature of the Build-Operate-Transfer-Ownership Contract (B.O.T) The Build, Operate, and Transfer of Ownership Contract (BOT) has emerged as the most successful and safest method for involving the private sector in public sector services. The major infrastructure projects that are built through the BOT contract are no longer financed by the state and its budget, but the private sector has played a major role in financing These projects, especially developing countries that need to establish infrastructure or modernize their existing infrastructure, especially in the areas of transport, communications, services, electricity, water ..... and other public utilities.

Publication Date
Tue May 30 2006
Journal Name
Baghdad University
Unpublished Cuneiform Texts From The Reign Of The King Ammi Şaduqa
...Show More Authors

The cuneiform texts considered one of the most important resources which play an important role help us to know how was the economic , politic and religious manner and every thing have relation of the history of Mesopotamia which contain many of information that enrich our knowldgement every side of Mesopotamia civilization since using writing as away to register the science and human knowldgement . The city of Sippar (Abu –Habba ) was one of most important city of ancient Mesopotamia which mentioned as one of first five Mesopotamian cities found before floating and it exposed through excavating rich one of them tablet which some of it dated to old Babylon period . The king Ammi-Saduqa has a big share of tablet we study number of thi

... Show More
Publication Date
Mon Sep 26 2022
Journal Name
Journal Of Advanced Research In Hr And Organizational Management
Entrepreneurial Performance of the Organization According to the Approved Training Strategy
...Show More Authors

The research aims to determine the role of the training strategy with its dimensions of (strategic analysis, formulation of training strategy, implementation of training strategy, evaluation) in the pioneering performance of the organization with its dimensions of (pre-planning , renewal and modernization, efficiency, effectiveness). Important and modern in pioneering performance and training strategy, and in recognition of the importance of the subject and the expected results of the surveyed banks, an analysis was made of the data obtained through field visits in addition to the questionnaire and interviews ,and the most prominent results that were reached were taking the research sample into consideration all the requirements of the trai

... Show More
Publication Date
Thu Jun 01 2006
Journal Name
Modern Sport
Evaluating the level of controlling The Ball in Basketball for Youth
...Show More Authors

The aim of this research was to evaluate the level of ball control in basketball. There was a great weakness in ball control that affected the mastery of many skills that affect the success of the team. The researcher also found a lack in training programs concerning ball control. The researchers used (9) special tests for ball control out of (41) test applied on young basketball players were (86). The researchers concluded that: 1. Criteria were set for test results of ball control. 2. A level of criteria was set for test results of ball control.

Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Astronomy Reports
Ionized gas in the circumgalactic vicinity of the M81 galaxy group
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
From the flags of The Koofic Grammar: Abdullah Al-Tuaal (243A.H)
...Show More Authors

    This research has tackled a scientific figure belongs to Koofi grammatical school. He is Abdullah Al-Tuaal who has occupied the fourth layer among the Koofi grammarians. There was a confusion between him and another Koofi grammarian from the same layer (Mohammed Bin Qaadim) in some old references. This research has clarified this confusion to affirm that they are two different grammarians.This research also tackles the scientific status of Al-Tuaal and the grammatical views that have been ascribed to him in addition to the analysis and discussion of these views. All this in the light of what has been mentioned in grammar books about the issues in which these views were stated.

View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the method of parsing anomalous valueIn estimating the character parameter
...Show More Authors

In this paper the method of singular value decomposition  is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The aesthetic effect of vocal recitation in building the theatrical image
...Show More Authors

Between the duality of sound and image, the completeness of the actor’s personality at the director comes to announce the birth of the appropriate theatrical role for that character as the basic and inherent element of the artwork, within his working system in the pattern of vocal behavior as well as motor/signal behavior as he searches for aesthetic and skill proficiency at the same time.
This is done through the viewer’s relationship with the theatrical event, which the director considers as an area of active creative activity in relation to (the work of the actor) through vocal recitation and the signs it broadcasts in order to fulfill the requirements of the dramatic situation and what it requires of a visual vision drawn in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security & Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref