The Vogue of the Restoration Comedy of Manners and George Etherage's The Man of Mode; or, Sir Fopling Flutter
DBNRAHA Hameed, IJRSSH PUBLICATION, 2018
A histological study was conducted to examine the structure of Cerebellum in Coturnix coturnix (Linnaeus). The results showed that the cerebellum is a portion of the Rhombencephalon and Metencephalon lying behind the cerebrum, the surface of the cerebellum contains deep folds and appears spherical in its shape. It represented the dorsal side of metencephalon and surrounded the roof of IV ventricle. The cerebellum consists of three parts spino cerebellum, cerebro cerebelluum and vestibulo cerebellum; and three lobes anterior lobe, posterior lobe and flocculonodular lobe. The corpus cerebellum (Vermis) consists of nine folds called cerebellar-folia (IX-I) and separated from each other by sulci.  
... Show MoreThe research presented the experience of creating a new sustainable city, and this experience of establishing an Eco-City (Environmentally friendly) is considered the first experience in Iraq. The current study stressed the importance of the need for environmental planning in the early stages of planning new cities based on realism in planning, design and implementation. Subsequently, that aims to preserve the ecosystem, which is difficult to compensate if degraded or polluted. The research incorporated environmental planning indicators within sustainable urban planning (Reliance on generating electric power that is based on clean and renewable energy sources, Availability of public t
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreABSTRACT. 4-Sulfosalicylic acid (SSA) was used as a ligand to prepare new triphenyltin and dimethyl-tin complexes by condensation with the corresponding organotin chloride salts. The complexes were identified by different techniques, such as infrared spectra (tin and proton), magnetic resonance, and elemental analyses. The 119Sn-NMR was studied to determine the prepared complexes' geometrical shape. Two methods examined the antioxidant activity of (SSA) and prepared complexes; Free radical scavenging activity (DPPH) and CUPRRAC methods. Tri and di-tin complexes gave high percentage inhibition than ligands with both methods due to tin moiety; the triphenyltin carboxylate complex was the best compared with the others. Also, antibacter
... Show MoreAn optical video communication system is designed and constructed using pulse frequency modulation (PFM) technique. In this work PFM pulses are generated at the transmitter using voltage control oscillator (VCO) of width 50 ns for each pulse. Double frequency, equal width and narrow pulses are produced in the receiver be for demodulation. The use of the frequency doubling technique in such a system results in a narrow transmission bandwidth (25 ns) and high receiver sensitivity.
This world is moving towards knowledge economy which basically depends on knowledge and information. So, the economic units need to develop its financial reporting system which helps to provide useful information in timeliness for investors in accordance with the requirements of the knowledge economy and meets the needs of those investors. This research aims to revealing the reflects of knowledge economy on the approaches of financial reporting and suggesting a financial reporting model in the environment of knowledge economy, depending on combining the value approach with the events approach using database and communication technology and providing useful accounting information for all users regardless of
... Show MoreThe aim of this work is to study the correlation between the electrons for Li atom in ground state through the calculation of the inter-particle distribution function f (r12) and inter-particle expectation values . By using the f(r12) function for KL shell in both singlet and triplet state .The Fermi hole have been evaluated .In this work the Hartree-Fock wave function (1993) have been used.
In this research, the region in the south-west of Iraq is classified using a fuzzy inference system to estimate its desertification degree. Three land cover indices are used which are the Normalized Difference Vegetation Index, Normalized Multi-Band Drought Index and the top of atmosphere surface temperature to build a fuzzy decision about the desertification degree using eight decision roles. The study covers a temporal period of 38 years, where about every 10 years a sample is elected to verify the desertification status of the region, starting from 1990 to 2018. The results show that the desertification status varied every 10 years, wherein 2000 encountered the highest desertification in the south-west of Iraq.