Preferred Language
Articles
/
jcois-385
Seeing Allah Almighty Detective according to incoming nodules In the interpretation of Ibn Arabi Maliki 9345 H
...Show More Authors

Seeing Allah Almighty
Detective according to incoming nodules
In the interpretation of Ibn Arabi Maliki
9345 H

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Shapes as an Alternative to the Word in Designing Textbooks: سحر علي سرحان-منى محمد غلام
...Show More Authors

Shapes have differed in terms of their temporality, tools, technical variations, aesthetic functions and dimensions. The beginnings started with manual primitive techniques that have played an a significant artistic role in the ancient civilizations, then developed with the technological development and the digital technologies that encompassed various programs and specialist means in the graphic design, so that its visual outputs in the textbook that is considered a communication means that has an effect and attracts the recipient. That is what made the researcher search and investigate this topic describing the research problem as follows: What are the shapes as alternatives to the words in the design of the textbook? The research obje

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The role of competitive intelligence and reverse engineering to achieve competitive advantage
...Show More Authors

Abstract

In light of the great technological development and the emergence of globalization has increased global competition, where it became competitive exercise pressure on all sectors. In light of this companies mast enviorment depend on the means that keeps them on the competitive position through access to information about competitors in order to help them to draw a strategy that will achieve a competitive edge either through excellence or reduce the costs of their products and this means intelligence competitive and reverse engineering that help to gain information on competitors analyze and put of the decision-maker From this point formed the idea of ​​research in the statement of the role of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 24 2020
Journal Name
Psychology And Education
The Use of Ergative Verbs to Background the Role of the Agent in two Selected Short Stories: A Syntactico-Semantic Study
...Show More Authors

The study explores the use of ergative verbs in constructing clauses and their impact on the backgrounding of the agent's role in two selected short stories. Contrary to hypothesis No. 1, the research indicates that changes in sentence patterns don't affect the meaning of the process. Additionally, hypothesis No. 2 is refuted as the middle structure is found to highlight the agent's role in the science fiction short story, Terra Infirmum, rather than concealing it as hypothesized for "The Invisible Man." The analysis uncovers that writers utilize ergative processes to narrate stories in various ways, including transitive/active voice, intransitive/active voice, and transitive/passive voice. Furthermore, the findings suggest that writers emp

... Show More
View Publication
Publication Date
Tue Jun 30 2009
Journal Name
Al-kindy College Medical Journal
The Effect of Continuous Darkness and Continuous Light on the Reactivity of Smooth Muscles to Drugs in the Rat Vas Deferens
...Show More Authors

Background: The vasoconstricting agents: nor-adrenaline and 5- hydroxytryptamine
(5-HT) have a stimulant action on smooth muscle contractility of the rat vas deferens.
Objective: This study aimed to investigate the effect of exposure to continuous
darkness and continuous light on the contractility of the vasa deferntia smooth
muscles from rats to applied nor-adrenaline and 5-HT.
Method: Male albino wistar rats were divided into 3 experimental groups. Group 1:
Control animals, were exposed to the ordinary photoperiod each day. Group 2: Rats
were kept in a dark room. Group 3: In a room under a bright artificial light.
All animals were killed after 4 weeks.
Results: Vasa deferentia preparations from continuous dar

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
The Response of Bitter Orange Citrus Aurantium Trees to the Infestation of Oriental Yellow Scale Aonidiella Orientalis in Iraq
...Show More Authors
Abstract<p>Laboratory studies were carried out to investigate the differences between uninfested and infested bitter orange <italic>Citrus aurantium</italic> leaves with oriental yellow scale <italic>Aonidiella orientalis</italic> in Iraq. From this experiment, it is reasonable to determine that releases of volatile organic compounds from both uninfested and infested bitter orange <italic>C. aurantium</italic> as a response to the infestation of the oriental yellow scale <italic>A. orientalis</italic>. Some volatile organic compounds were found in uninfested leaves, while GC-MS did not detect others. Infested leaves by oriental yellow scale insects emitted</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Apr 02 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
The effects of additives in to heat treatment temperature and time on the crystallinity of lithium silicate glass-ceramic
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Apr 16 2021
Journal Name
Pharmaceutical Medicine
The Epidemic of Substandard and Falsified Medications in Iraq: Evaluating the Effectiveness of National Pharmacovigilance Alerts to Community Pharmacies
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2006
Journal Name
Al-kindy College Medical Journal
The Use of Spiral Computerized Tomography in the Diagnosis of Middle –Third Facial Fractures as Compared to Plain Radiography
...Show More Authors

Background: Trauma is one of the most common
clinical problems that confront the maxillofacial
surgeon and radiologist alike. Middle third facial
fractures are diagnosed primarily on the bases of
clinical examination and plain radiographs than can
result in much preoperative speculation.
Objective: To assess the advantages of spiral
computerized tomography over conventional
radiography in the pre-surgical evaluation of middle
third facial fractures.
Methods: Thirty patients with thirty-eight facial
fractures were studied, all patients were examined
clinically, by plain radiography and then by spiral CT.
Results: Of the 38 middle-third fractures, 16
(42.1%) were zygomatic fractures, 8 (21.1%) were

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SEASONAL POPULATION ABUNDANCE OF THE CHRYSANTHEMUM APHIDS (HOMOPTERA, APHIDIDAE) IN THE MIDDLE OF IRAQ WITH PICTORIAL KEY TO SPECIES
...Show More Authors

    This study was based on the determination of aphid species that infested Chrysanthemum sp. (Asterales, Asteraceae) in the middle of Iraq; five aphid species belong to subfamily Aphidinae were recorded: Aphis fabae Scopoli, 1763, Aphis gossypii Glover, 1877,  Coloradoa rufomaculata (Wilson, 1908), Macrosiphoniella sanborni (Gillette, 1908) and Myzus persicae (Sulzer, 1776). A. gossypii was the most dominant species throughout the study period while M. persicae  is the lesser species.

    A summary of  the main taxonomic characters is presented here and a pictorial key which was designed to separate aphi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Counting Functions to Generate The Primes in the RSA Algorithm and Diffie-Hellman Key Exchange
...Show More Authors

        The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods  depended on selecting the primes p and q in order  to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article   gives  new construction  of the  RSA  algorithm and DH key  exchange using the

primes p,qfrom areal number x.

View Publication Preview PDF
Crossref