The study of the (dualist antagonism) of a poet, will be determined by the poet's potential, and according to the system of concepts and creativity, and this means that there is a difference between the rooting of the meaning and its roots, and poetic sources by tracking the poets and their attitudes.
Therefore, poetry is a variable function according to the values of the movement, which is the freedom and continuous fuel. With these units of measurement, can measure the dose (Ahmed Bakheet) of freedom and mechanisms of investment, Bakheet (moment) of the time of hair dimensions of the limits of his experience. This is what the researchers will address in their research.
The current study aimed to detect the effect of gentamicin stress on the expression of hla (encodes hemolysin) and nuc (encodes nuclease) genes of Staphylococcus aureus. Fifty-eight isolates identified as S. aureus were isolated locally from different clinical specimens. Disk diffusion method was used to detect the resistance to S. aureus. The minimum inhibitory concentration (MIC) of gentamicin was estimated by broth microdilution method. hla and nuc genes were determined by polymerase chain reaction technique. The biofilm was evaluated using the microtiter plate method in the presence and absence of gentamicin at sub-MIC. The results showed that 18 (31%) and 40 (69%) S. aureus isolates were sensitive and resistant to gentamicin, respectiv
... Show MoreThis study focuses on how tax administrations in Iraq use Artificial Intelligence (AI) techniques to monitor tax evasion for individuals and companies to achieve Tax Compliance (TC). AI was measured through four dimensions: Advanced Data Analytics Techniques (ADAT), Explainable AI (EAI), Machine learning (ML), and Robotic Process Automation (RPA). At the same time, TC was measured through registration, accounting, and tax payment stages. We relied on the questionnaire form to measure the variables. A sample of employees in the General Tax Authority in Iraq was selected, and a questionnaire was distributed to 132 people. The results indicated that the dimensions of AI affect achieving TC at all stages. This study provides evidence of using A
... Show MoreIn the years recently city planning projects have been confirmed sustainable high concentration on planning streets and pedestrian paths being the most prominent component of the urban structure in the city and these me and diverse departments link the city’s sectors and serve as a space for economic, service, and social activities. On the other hand, pedestrian traffic is an essential component of the various means of transportation within the city. Suffer cities in the Middle East and Arab cities in particular are neglecting pedestrian paths in the vital urban environment. Vehicle control mechanisms on roads, and changing the uses of pedestrian paths as result of encroaching on the sidewalks designated for pedestrians. Which leads to a
... Show MoreRenewable energy resources have become a promissory alternative to overcome the problems related to atmospheric pollution and limited sources of fossil fuel energy. The technologies in the field of renewable energy are used also to improve the ventilation and cooling in buildings by using the solar chimney and heat exchanger. This study addresses the design, construction and testing of a cooling system by using the above two techniques. The aim was to study the effects of weather conditions on the efficiency of this system which was installed in Baghdad for April and May 2020. The common weather in these months is hot in Baghdad. The test room of the design which has a size of 1 m3 was situated to face the geographical south. The te
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreIn this paper, the characteristics of microstrip monopole antennas are studied firstly in free space. Secondly, the effects of the human body on the studied antenna's performance are investigated for wearable communications. Different patch shapes of microstrip monopole antenna are chosen to operate at two bands: industrial scientific and medical band (ISM) and ultra-wideband (UWB) for wearable applications. The studied antenna consists of a radiating element on one side of the substrate and a partial ground plane on the other side. The antenna is supposed to fabricate on cloth fabric whose relative dielectric constant is Ɛr =1.7. At the same time, the pure copper could be used as the conducting part representing both t
... Show More