Preferred Language
Articles
/
jcopolicy-636
The Impact of Putinism on the Russian-Ukrainian Conflict: an analysis of the contents of the speeches of Russian President Vladimir Putin on the causes of the Russian war on Ukraine in 2022
...Show More Authors

this research seeks to shed light on the study of the impact of Putinism on the Russian-Ukrainian war that broke out in early 2022, by studying the contents of the speeches of Russian President Vladimir Putin before the start of the war. This research uses the structural approach in analyzing the components of the Russian political regime. The research tools used in this research include case studies, content analysis of Russian speeches, and personal meetings of researchers and specialists in Russian affairs. It sums up a number of important conclusions, most notably are : 1) Putinism is a totalitarian regime that includes the political doctrine during the era of Russian President Vladimir Putin. 2) Duginism represents the totality of the beliefs of the Russian thinker Alexander Dugin, including the Fourth political theory and Eurasianism, was part of the Putinism and not vice versa. 3) Putinism plays a major role in the outbreak of the Russian war on Ukraine at the ideological level and political decision-making within the Russian elite. 4) Putinism is developed in three Main stages: the first stage includes arranging the Russian house from the inside, while the second stage is balance, and international partnership, whereas the third stage is the quest to end unipolarity and establish a multipolar world through the preemptive strike represented by the Russian war on Ukraine in February 2022. A stage is still in the process of formation

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Information Sources and their Role in E-learning from Iraqi College Students’ Viewpoint
...Show More Authors

The study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 30 2008
Journal Name
Al-kindy College Medical Journal
Left Ventricular Hypertrophy in Diabetic Patients and Its Relation to Other Diabetic Complications
...Show More Authors

Background: left ventricular hypertrophy is independent risk factor for cardiovascular morbidity and mortality. The presence of diabetic complications such as autonomic neuropathy and retinopathy may predict cardiac structural changes in diabetic patients. Objective: To explore the chance of occurrence of left ventricular hypertrophy in diabetic patients and whether it is related to the presence of other diabetic complications. Methods: ninty seven (97) normotensive diabetic patients (57) type II with mean duration of diabetes of (12±6 y) and forty (40) type I with mean duration of (8±6 y) were studied by echocardiography and compared with 41 patients as control. Results: The LVMI was significantly higher in type II diabetics compared

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Tooth wear in relation to physical salivary characteris-tics among gastroesophageal reflux disease
...Show More Authors

Background: Gastroesophageal reflux disease, is a quite prevalent gastrointestinal disease, among which gastric content (excluding the air) returns into the oral cavity. Many 0ral manifestations related t0 this disease include tooth wear, dental caries also changes in salivary flow rate and pH. This study was conducted among gastroesophageal reflux disease patients in order to assess tooth wear in relation to salivary flow rate and pH among these patients and the effect of gastroesophageal reflux disease duration on this relation. Materials and methods: One hundred patients participate in this cross-sectional study for both genders and having an age range of 20-40 years old, patients had been endoscopically identified as having gastroeso

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Fri Aug 19 2022
Journal Name
International Journal Of Health Sciences
Interleukin-32, interleukin-33 and acid phosphatase levels in patients with Helicobacter Pylori
...Show More Authors

The study was carried out to detection of H. pylori in (218) patients who attended two teaching hospitals in Baghdad. The diagnosis was done by Immunochromatography methods. Stools and blood samples were taken from each patient as well as other (30) healthy control matching in age. The study included measurement the Levels of Interleukin-32, Interleukin-33, and Acid phosphatase   in sera of patients and control .The result indicated  presence  of H pylori antigen in 115 cases 59 cases  of males and 51 of females , Also, the result indicated  increasing levels of IL-32 and IL-33 and Acid phosphatase  in patients sera  in comparison with healthy control.

View Publication
Crossref
Publication Date
Wed Dec 20 2023
Journal Name
Discourse And Interaction
Refusal and politeness strategies favoured among Iraqi and Malaysian learners in marriage proposals
...Show More Authors

The study targets exploring the similarities and differences between Iraqi and Malaysian learners of English in refusing marriage proposals. Also, it examines the favored politeness strategies that learners use to protect their interlocutors’ face, heeding both their social distance and status. Data were gathered by a Discourse Completion Task (DCT) which contained six marriage situations. Responses were analyzed based on Beebe et al.’s (1990) refusal taxonomy and Scollon et al.’s (2012) politeness system. The findings indicated that both the Iraqi and Malaysian learners preferred the indirect refusal strategies in marriage proposals, as well as the hierarchical politeness in the form of independence strategies regardless of t

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Optimum conditions for ascorbic acid determination in three Iraqi citrus using HPLC technique
...Show More Authors

A high-performance liquid chromatography method was employed for the quantitative determination of ascorbic acid (AA) which called vitamin C in three types of Iraqi citrus (orange mandarin and aurantium ) and to establish this goal , evaluation of ascorbic acid degradation is so important due to its significant criticality when exposure to ordinary atmospheric conditions. The chromatographic analysis of AA was carried out after their sequential elution with KH2PO4 ( as mobile phase) by reverse-phase HPLC technique with C8 column and UV detection at 214 nm. .Bad resolutions was appeared clearly for C8 column , so another alternative condition were carried out to improve the resolution by replacement of C8 by C18 column .Statistical treat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Finding timewise diffusion coefficient from nonlocal integral condition in one-dimensional heat equation
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Materials Letters
Temperature stable electric field-induced strain in Er-doped BNT-BT-BKT ceramics
...Show More Authors

View Publication
Scopus (15)
Crossref (12)
Scopus Clarivate Crossref