Preferred Language
Articles
/
jcois-511
The concept of insect In Islamic faith
...Show More Authors

In this research, the researcher sheds light on the greatness of the horrors (Al-Hashr) enlightened by the Holy Quran, explaining his dangerous details, his horrors, and his frightening changes.  -35-36-37
  Perhaps the most prominent motivations for the research and its justification is to remind people of the days of God Almighty, and the mention of the insect always pushes the believer to do honorable, and avoid sins, over the days, and prepare for the time of the resurrection, in the hands of knowing a scientist.
    In order to identify the subject of entomology and its contents, the researcher based his study on the scientific methodology, it has excavated the origin of the entomology and its meanings, showing the proven and untrue statements, revealing the types of crammed. In addition to distinguishing between the insects and the Baath, the insects and publishing, and the corners of the creatures and non-cornered, and how to physically cramming on the Day of Resurrection and the difference between the speech scientists, is the old body itself or a new body others.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Thin Solid Films
Studies of annealing impact on the morphological, opto-dielectric and mechanical behaviors of molybdenum-doped CrN coatings
...Show More Authors

View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
International Journal Bioautomation
Model for Prediction of the Weight and Height Measurements of Patients with Disabilities for Diagnosis and Therapy
...Show More Authors

Background: Accurate measurement of a patient’s height and weight is an essential part of diagnosis and therapy, but there is some controversy as to how to calculate the height and weight of patients with disabilities. Objective: This study aims to use anthropometric measurements (arm span, length of leg, chest circumference, and waist circumference) to find a model (alternatives) that can allow the calculation of the height and the body weight of patients with disabilities. Additionally, a model for the prediction of weight and height measurements of patients with disabilities was established. Method: Four hander patients aged 20-80 years were enrolled in this study and divided into two groups, 210 (52.5%) male and 190 (47.5%) fe

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn: 1683 - 3597 , E-issn : 2521 - 3512)
Evaluating the Clinical Outcomes of Three Medication Regimens for Treating a Sample of Iraqi Persistent Asthmatic patients
...Show More Authors

Abstract     Asthma is a complex disease defined by chronic airway inflammation and airflow limitation causing variable respiratory symptoms which include shortness of breath (SOB), wheezing, chest tightness and cough. Asthma guidelines advocate adding a second long acting bronchodilator to medium doses of inhaled corticosteroids (ICS) rather using high doses of ICS alone to control moderate to severe persistent asthma. The aim of this study was to evaluate the clinical outcomes of three medication regimens indicated for Iraqi patients suffering from persistent asthma.      This study was interventional randomized clinical study conducted on a sample of adult Iraqi asthmatic patients in Baghdad City. The study com

... Show More
Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluating the Clinical Outcomes of Three Medication Regimens for Treating a Sample of Iraqi Persistent Asthmatic patients
...Show More Authors

Abstract

    Asthma is a complex disease defined by chronic airway inflammation and airflow limitation causing variable respiratory symptoms which include shortness of breath (SOB), wheezing, chest tightness and cough. Asthma guidelines advocate adding a second long acting bronchodilator to medium doses of inhaled corticosteroids (ICS) rather using high doses of ICS alone to control moderate to severe persistent asthma. The aim of this study was to evaluate the clinical outcomes of three medication regimens indicated for Iraqi patients suffering from persistent asthma. 

    This study was interventional randomized clinical study conducted on a sample of adult Iraqi asthm

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Aug 08 2024
Journal Name
Computation
Evaluation of the Dynamics of Psychological Panic Factor, Glucose Risk and Estrogen Effects on Breast Cancer Model
...Show More Authors

Contracting cancer typically induces a state of terror among the individuals who are affected. Exploring how glucose excess, estrogen excess, and anxiety work together to affect the speed at which breast cancer cells multiply and the immune system’s response model is necessary to conceive of ways to stop the spread of cancer. This paper proposes a mathematical model to investigate the impact of psychological panic, glucose excess, and estrogen excess on the interaction of cancer and immunity. The proposed model is precisely described. The focus of the model’s dynamic analysis is to identify the potential equilibrium locations. According to the analysis, it is possible to establish four equilibrium positions. The stability analys

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
השואה והשלכותיה על אהרון אפלפלד - עיון בשלושה סיפורים קצרים עוזר למורה – עלי מוחמד רשיד The Holocaust and its impact on Aharon Bielefeld - A Study in Three Short Stories
...Show More Authors

מטרת המחקר הזה היא לבדוק את שלושה סיפורים קצרים מהקובץ הראשון של אהרון אפלפלד , שנחשב ההצהרה הרשמית על היותו סופר השואה הראשון בישראל , המשותף לשלושת הסיפורים הוא הנימה של הגיבורים היוצאים למסע פיזי ונפשי לגלות את אשר אירע להם , מגמתו של המחקר היא לבדוק את הצורה המיוחדת שבה אפיין אפלפלד את גיבוריו שמעידים על כך , כי השואה היא החוויה המרה והקשה בקרב היהודים והשלכותיה נשארה טמונה בקרבם גם אחרי המלחמה ואחרי שנים

... Show More
View Publication Preview PDF
Publication Date
Tue May 24 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Blind Video Copyright Protection Technique in Maximum and Minimum Energy Frames Based on The Fast Walsh Hadamard Transform (FWHT) and Discrete Wavelet Transform (DWT) and Arnold Map
...Show More Authors

Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Feb 18 2022
Journal Name
Journal Of Blood Medicine
Circulating miR-126-3p and miR-423-5p Expression in de novo Adult Acute Myeloid Leukemia: Correlations with Response to Induction Therapy and the 2-Year Overall Survival
...Show More Authors

Abstract Background: Acute myeloid leukemia (AML) results from sequential genetic alterations in a normal hematopoietic stem cell or its progenitors giving rise to an autonomous clone that dominates the bone marrow leading to marrow failure. MicroRNAs are short non-coding nucleic acid sequences that regulate post-transcriptional gene expression by base-pairing with their target mRNAs. MiRNAs can be secreted into extracellular fluids and carried to target cells by vesicles or bound to proteins. Intracellular and circulating miRNAs are believed to be useful markers in the diagnosis, prognosis, and treatment of various cancers. Practically, circulating miRNAs are more stable at room temperatures and extreme conditions. Purpose: This study aim

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Journal Of Blood Medicine
Circulating miR-126-3p and miR-423-5p Expression in de novo Adult Acute Myeloid Leukemia: Correlations with Response to Induction Therapy and the 2-Year Overall Survival
...Show More Authors

The study aimed to compare the expression of miR-126-3p and miR-423-5p in patients and normal subjects, and correlate their expression with response to induction therapy. Circulating miR-126-3p and miR-423-5p were measured in the plasma of 43 adult AML patients and 35 age- and sex-matched controls by real time PCR. The foldchange in differential expression for each gene was calculated using the comparative cycle threshold (CT) method (also known as the 2−CT method). For statistical purposes, the fold change was calculated using DDCT (or 2–∆∆Ct) method to find the relative expression of miRNAs. The expression fold change of miR-126-3p was 1.73-fold increase in patients than controls (p= 0.010). The expression fold change of miR-423-5

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref