Preferred Language
Articles
/
jmracpc-52
DETECTION OF MICROBIAL CONTAMINATION IN IMPORTED FROZEN CHICKEN THAT AVAILABLE IN LOCALLY MARKETS: DETECTION OF MICROBIAL CONTAMINATION IN IMPORTED FROZEN CHICKEN THAT AVAILABLE IN LOCALLY MARKETS
...Show More Authors

The study was carried out to study the quality of 7 samples of imported frozen chicken that are available in locally markets. These samples were collected from Baghdad markets in June 2010. The results were showed that the all samples were not content the name of company and batch number one the labeling, while the microbial test refer to found contamination in all samples, but it in the limited of Iraqi standers specification for frozen chicken, also note Staphylococcus aureus in all samples, the samples C1 and C2 have Salmonella ohio, while not observe Coliform bacteria in all samples.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The role of tourism in economic growth-outlook for the role of tourism in Iraqi marshes development.
...Show More Authors

The tourism activity is one of the pillars on which the economy of any country is based , the importance of the tourism sector is reflected in its potential to become an effective development alternative in many countries, especially Iraq ,this has a direct impact on the national economy as an important source in attracting hard currency and eliminating unemployment. Adding the Iraqi Marshlands to the list of effects makes it contribute to diversification of sources of income and stimulating rest of the economic sectors, the potentials and qualifications possessed by Iraq in the field of tourism and monuments have a significant impact on the state budget if they were exploited optimally. The research aims at identifying the contr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Social Manifestation in India in the Islamic period
...Show More Authors

The Social life contain an important side from the inherited Civilization to any
nation, is distinguished by activity and zeal. The old Indian is characterized with
closed and solidify socilal systems. This state had its influences on the activities of the
social movment. It astonished the conquered mushins – Arab to the India from the end
of the first centuny A.H we tried to change it by good works and made them become
aware, so this made radical active in the social India in Islamic period which is form
humanbeing nobilitie and their active deal in the society.

View Publication Preview PDF
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect The behavior of workers in the insurance companies in achieving competitive advantage: An Applied research in a sample of the general insurance companies
...Show More Authors

Service companies always working to increase their competitiveness and efficiency of the survival, growth and development in the present and the future, including insurance companies, so as to increase competition, especially after the emergence of the civil companies dramatically after 2003, has become the goal of recent studies carried out by the organizations is the human capital, because its success and excellence and achievement its objectives depends on the human, and this does not mean that the other components are not important, but also rely on the rights which has increased interest in the search for the way in which they can guide the behaviors and values ​​and their own language in line with the organization's strategy an

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2007
Journal Name
Journal Of Educational And Psychological Researches
مقترح تصميم منهج جغرافي في ضوء التعليم عن بعد وتدريسه للمعلمين في الكلية التربوية المفتوحه في العراق لتجويد العملية التعليمية الجامعية مستقبلا
...Show More Authors

     لقد إزدادت التطورات العلمية والتكنولوجية ولاسيما المعلوماتية زيادة في العلوم والحقائق والنظريات والإكتشافات بصورة مذهلة، وكذلك زيادة فروع في العلم والمعرفة ففي كل يوم نشهد قيام فروع أو تخصص معرفي جديد، إضافة إلى تفجر المعرفة التي ساهمت في بناء قنوات الفروع والتخصصات العلمية القديمة والجديدة (عبد الغفور 2001 ص8).

     فالثورة في مجال العلم والمعرفة والمعلومات والإتصا

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Logic in the philosophy of ethical behavior in business organizations
...Show More Authors

Logic in the philosophy of ethical behavior in business organizations

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 15 2023
Journal Name
Full Text Book Of Minar Congress 7
EVALUATING THE CHANGE DETECTION OF(NDVI) FOR BABYLON CITY USING REMOTE SENSING AND GIS TECHNIQUES (2015-2020)
...Show More Authors

The normalized difference vegetation index (NDVI) is an effective graphical indicator that can be used to analyze remote sensing measurements using a space platform, in order to investigate the trend of the live green vegetation in the observed target. In this research, the change detection of vegetation in Babylon city was done by tracing the NDVI factor for temporal Landsat satellite images. These images were used and utilized in two different terms: in March 19th in 2015 and March 5th in 2020. The Arc-GIS program ver. 10.7 was adopted to analyze the collected data. The final results indicate a spatial variation in the (NDVI), where it increases from (1666.91 𝑘𝑚2) in 2015 to (1697.01 𝑘𝑚2)) in 2020 between the t

... Show More
View Publication
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Mon Apr 29 2024
Journal Name
Journal Of The College Of Basic Education
Detection Of Biofilm Formation By Beta- Lactam Resistance Klebsiella Pneumoniae Isolated From Clinical Specimens And Aquatic Samples
...Show More Authors

Preview PDF
Publication Date
Fri Feb 06 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Early detection of periodontitis among young adult cigarette smokers and non-smokers using cone beam computed tomography
...Show More Authors

Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth exc

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref