Preferred Language
Articles
/
jcois-2221
The battle of Dumat al-Jandal And its impact on the era of prophecy And the righteous caliphate
...Show More Authors

The research in Islamic history is considered a title for the glory of the nation and a mirror for the intellectual and mental maturity of the men of the Islamic state who played an important role in saving humanity from darkness to light and from ignorance to knowledge and to show their position in building the Islamic state, and to highlight the importance of their conquests of neighboring cities and the expansion of Islam, and for this reason they appear The importance of writing on the topic (The Battle of Dumat al-Jandal and its impact on the era of the Prophethood and the Rightly Guided Caliphate). The reason for choosing this topic was to show the status of Dumat al-Jandal and its importance in the Islamic state and its great role in driving away the specter of the Byzantine enemy that was threatening the Islamic state at the time.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study on Candida spp. infection oral thrush and bacteria accompanied it from children
...Show More Authors

Oral swab samples were collected from 120 children (ages between one month- 10 years) who were infected with oral thrush and 30 healthy children. The percentages of isolated yeasts and Bacteria were 66.6% and 96.6% respectively. The dominate yeast and bacteria were Candida albicans and Staphylococcus aureus with of 78.7% and 34.4% respectively. Results revealed that the highest percent of infection with oral thrush disease was 32.5% in children within the age of 1-2 months.

View Publication Preview PDF
Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Biochemical And Cellular Archives
THE ONCOGENIC EFFECT OF EBV/HPV CO-INFECTION IN A GROUP OF IRAQI WOMEN WITH CERVICAL CARCINOMA
...Show More Authors

The current paper was designed to find the possible synergic effect of EBV infection with the HPV-16 in Iraqi women suffering from cervical carcinoma. This retrospective study involved paraffinized blocks of two groups. The research included 30 carcinomatous cervical tissues and 15 samples from normal cervical biopsies. After sectioning using positively charged slides, immunohistochemistry (IHC) was performed to detect anti-Epstein Barr Virus LMP1 and Human papillomavirus type 16 primary antibodies. Sixty-three percentage (19 out of 30) of the studies group showed positive overexpression as shown in with a significant association of the expression with cervical cancer with a significant association (p = 0). The co-infection of the EBV and H

... Show More
Scopus (4)
Scopus
Publication Date
Thu Dec 01 2022
Journal Name
Caspian Journal Of Environmental Sciences
Histological study of liver in Dhub lizard Uromastyx aegyptius microlepis (Blanford, 1874) during the period of hibernation
...Show More Authors

Scopus
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Spectral Study of Pt (II), Cr (II) Polymeric Complexes of the Ligand N- Crotonyl -2- Hydroxy-Phenylazomethine
...Show More Authors

 The polymeric complexes were obtained from the reaction of polymeric Schiff base.N-crotonyl-2-hydroxyphenylazomethine (HL), with divalent metals Pt (II), Cr (II). The modes of bonding and overall geometry of the complexes were determine through spectroscopic methods and compared with that reported from analogous monomeric ligand. This study revealed square planer geometry around the metal center for [Pt(L)Cl] and distorted octahedral geometry for Cr complex [Cr(L)Cl(H2O)2].

View Publication Preview PDF
Publication Date
Tue Mar 01 2016
Journal Name
Journal Of Baghdad College Of Dentistry
A Comparison of the Effectiveness of Reciprocating System with Continuous Rotary Systems in Non-Surgical Endodontic Retreatment
...Show More Authors

Background: Optimal root canal retreatment was required safe and efficient removal of filling material from root canal. The aim of this in vitro study was to compare the efficacy of reciprocating and continuous motion of four retreatment systems in removal of root canal filling material. Materials and Methods: Forty distal roots of the mandibular first molars teeth were used in this study, these roots were embedded in cold clear acrylic,roots were instrumented using crown down technique and rotary ProTaper systemize Sx to size F2 ,instrumentation were done with copiousirrigation of 2.5% sodium hypochlorite and 17% buffered solution of EDTA was used as final irrigant followed by distilledwater, roots were obturated with AH26 sealer and Prota

... Show More
Preview PDF