Preferred Language
Articles
/
jcois-2239
plural noun in Arabic Grammatical study
...Show More Authors

This is a research that deals with one of the topics of Arabic grammar, namely, the plural noun, and it is not hidden from the students the importance of grammatical topics in preserving the tongue from melody, and what it has of fundamental importance in knowing the graphic miracles of the Qur’an, and I called this research:

(plural noun in Arabic a grammatical study)

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Formation of Binuclear Metal Complexes with Multidentate Schiff-base Oxime Ligand: Synthesis and Spectral Investigation
...Show More Authors

The new polydentate Schiff-base oxime  (1E,1`E)-2hydroxy-3-((E)-(2-((E)-2hydrxy3-((E)-(hydroxyimino)methyl)-5-methylbenzyldeneamino)ethylimino)methyl)-5methylbenzaldehyde oxime H4L and its binuclear metal complexes with Mn(II), Fe(II), Co(II) and Cu(II) are reported. The reaction of 2,6 diformyl–4–methyl phenol with hydroxyl amine hydrochloride in mole ratios of 1:1 gave the precursor (E)-2-hydroxy-3((hydroxyimino)methyl)-5-methylbenzaldehyde. Condensation reaction of precursor with ethylenediamine in mole ratios of 2:1 gave the new N4O2 Schiff-base oxime ligand H4L. Upon complex formation, the ligand behaves as a tribasic hexadantate species.  The mode of bonding and overall geometry of the complexes were determi

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
تناول البحث تطورات بنية الانفاق الحكومي للمدة (1990-2014) اذ تشمل هذه المدة مدتين مختلفتين من حيث الظروف اذ اتسمت المدة الاولى (1990-2002) بفرض العقوبات الاقتصادية وحرمان الاقتصاد العراقي من المورد النفطي ,في حين اتسمت المدة الثانية (2003-2014) بوفرة ال
...Show More Authors

  The research explain the developments in the structure of government Expenditure for the period (1990-2014), this period include tow different periods in terms of the conditions, the first period (1990-2002)characterized by imposing the economic sanctions and deny the Iraqi economy from the oil revenues, while the second period (2003-2014) marked by abundance resource rents as a result of lifting the ban on oil exports, (autoregressive Distributed lag Model) has been used to measure the impact of government Expenditure in both side current and investment in the oil-GDP (gross domestic product) and non oil-GDP, the stady found that there is no significant relationship between current Expenditure in non-oil and oil-GDP in bo

... Show More
View Publication
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
New Approximation Operators Using Mixed Degree Systems
...Show More Authors

This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Abuse elder and relationship life review
...Show More Authors

The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 30 2008
Journal Name
Al-kindy College Medical Journal
Rate of Schneiderian First Rank Symptoms among Newly Diagnosed Schizophrenic Patients
...Show More Authors

Background: Schneiderian first rank symptoms are
considered highly valuable in the diagnosis of
schneideria.
They are more evident in the acute phase of the
disorder and fading gradually with time. Many studies
have shown that the rate of these symptoms are
variable in different countries and are colored by
cultural beliefs and values.
Objectives: To find out the rate of Schneiderian first
rank symptoms among newly diagnosed schizophrenic
patients, to assess which symptom(s) might
predominate in those patients, and to find out if there
is/are any correlation(s) between the occurrence of
these symptoms and the sex of the patients.
Methods: Out of twenty-four patients with no past
psychiatric hi

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Financial investment strategies – Conceptual Framework
...Show More Authors

The investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .

  &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Six-coordinate oxime-imine cobalt(III) complexes with amino acid co-ligands; synthesis and characterisation
...Show More Authors

In this publication, several six coordinate Co(III)-complexes are reported. The reaction of 2,3-butanedione monoxime with ethylenediamine or o-phenylenediamine in mole ratios of 2:1 gave the tetradentate imine-oxime ligands diaminoethane-N,N`-bis(2-butylidine-3-onedioxime) H2L1 and o-phenylenediamine-N,N`-bis(2-butylidine-3-onedioxime), respectively. The reaction of H2L1 and H2L2 with Co(NO3)2, and the amino acid co-ligands (glycine or serine) resulted in the formation of the required complexes. Upon complex formation, the ligands behave as a neutral tetradantate species, while the amino acid co-ligand acts as a monobasic species. The mode of bonding and overall geometry of the complexes were determined through physico-chemical and spectro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref