Having signed my eyes on the manuscript labeled (equity in the ancestral quarrel at the meeting of subordinate and representative metaphors) I was impressed by the process of achieving it; That manuscript came to light; to be seen by specialists in Arabic rhetoric and students of science, and supplement the library of rhetoric one of the sources ..
After about twelve months or maybe more, some people can’t achieve pregnancy. This might be a sign of infertility as a reproductive system disease. The following study was carried out to investigate the DAZ 1 gene methylation level and its association with azoospermia in Iraqi patients. One hundred and fifty human blood samples were collected from from different regions in Baghdad governorate, including (private medicals Labs and the high institute for infertility diagnosis assisted reproductive techniques and Kamal Al- Samara'ay IVF Hospital) from both fertile and infertile men. The control group consists of 50 samples ranging from 22 to 51 years old, while the patient (infertile group) consists of 100 samples ranging between 25 and 51 y
... Show MoreCommercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreAbstract
The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of
Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreThe present study is meant to inquire about the training needs of middle stage leaders in Bisha, (Saudi Arabia) from the perspective of teachers. To achieve this purpose, the researcher has designed a questionnaire containing (31) items, distributed to a sample of (157) teacher (male and female) from the target population.
This research has demonstrated that the level of training needs for middle stage leaders was moderately reported with an arithmetic mean equivalent to (2.42), and a standard deviation of (0.36). Results have shown no significant differences at (α=0.05) in the sample’s expectations of the study’s variables.
The study concludes with a list of recommendations such as working on developing training pro
... Show MoreJournal of Physics: Conference Series PAPER • THE FOLLOWING ARTICLE ISOPEN ACCESS Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method Luma Naji Mohammed Tawfiq1, Nadia H Al-Noor2 and Taghreed H Al-Noor1 Published under licence by IOP Publishing Ltd Journal of Physics: Conference Series, Volume 1294, Issue 3 Citation Luma Naji Mohammed Tawfiq et al 2019 J. Phys.: Conf. Ser. 1294 032020 DOI 10.1088/1742-6596/1294/3/032020 DownloadArticle PDF References Download PDF 135 Total downloads 88 total citations on Dimensions. Turn on MathJax Share this article Share this content via email Share on Facebook (opens new window) Share on Twitter (opens new window) Share on Mendeley (opens new window) Hide article and author
... Show MoreRacism changes its meaning, shape, purpose or function according to various factors such as time, place, motives, and backgrounds; among others. It seems, however, to have deep roots back in the history of mankind. Such a concept stems from a perceived difference with the other. It is fed by the feeling of being hierarchically superior in opposition to another party that is depicted as inferior. Since ancient times, racism is disguised in different forms and manifests itself on various levels. It is a truism that this ideology can be best presented via language.
Due to its negative implication, racism lends itself to a critical kind of research. As such, this paper is a critical pragmatic investigation for this phenomenon a
... Show MoreIn the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic
... Show More