Preferred Language
Articles
/
jpgiafs-476
تحليل فاعلية الشمول المالي لمعالجة الفقر في العراق مع إشارة الى التجربة النيجيرية
...Show More Authors

The focus of this research lies in the definition of an important aspect of financial development, which is reflected on the alleviation of poverty in Iraq, namely financial inclusion and then taking the path of achieving a sustainable economy, certainly after reviewing one of the important international experiences in this regard and finally measuring the level of financial inclusion in Iraq and its impact on poverty reduction through the absolute poverty line indicator.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
Journal Of Interdisciplinary Mathematics
α–connected fibrewise topological spaces
...Show More Authors

The theory of Topological Space Fiber is a new and essential branch of mathematics, less than three decades old, which is created in forced topologies. It was a very useful tool and played a central role in the theory of symmetry. Furthermore, interdependence is one of the main things considered in topology fiber theory. In this regard, we present the concept of topological spaces α associated with them and study the most important results.

View Publication
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets
...Show More Authors

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Pollution Research Journal
ANALYSIS OF THE HYDRAULIC CHARACTERISTICS OF AL MAHAWIL STREAM USING HECRAS: A FIELD STUDY
...Show More Authors

A water resources management for earthen canal/stream is introduced through creating a combination procedure between a field study and the scientific analytical concepts that distinguish the hydraulic problems on this type of stream with using the facilities that are available in HECRAS software; aiming to point the solutions of these problems. Al Mahawil stream is an earthen canal which is subjected to periodic changes in cross sections due to scour, deposition, and incorrect periodic dredging processes due to growth of the Ceratophyllum plants and weeds on the bed and banks of the stream; which affect the characteristics of the flow. This research aims to present a strategy of water resources management through a field study that conducte

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
International Journal Of Contemporary Mathematical Sciences
Approximation by Convex Polynomials in Weighted Spaces
...Show More Authors

Here, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity

Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
The Effect of Organic Matter Application on Phosphorus Status in the Calcareous Soil
...Show More Authors

A field experiment is conducted to study the effect of different levels of peat (0, 25, 50, 75, and 100 Mg ha-1 to uncropped and cropped soil to wheat. Soil samples are taken in different period of time (0, 3, 30, 60, 90, 120, and 180 days after cultivation to determine (NaHCO3-Exteractable P at 3 different depths (0-10, 10-20, and 20-30 cm). Field Experiment is conducted in a randomized complete block design (RCBD) with four replicates. Wheat, Al-Rasheed variety, is cultivated as a testing crop. The entire field is equally dived in two divisions. One of the two divisions is cultivated to wheat and the second is left uncropped. The effect of five levels of peat namely 0, 25, 50, 75, 100 Mg ha-1 is investigated. Soils are fully analyzed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Apr 30 2025
Journal Name
Iraqi Journal Of Science
Calculating the Variation of the Universal Parameter (Variable) Using Kepler's Equation for Different Orbits
...Show More Authors

Stumpff functions are an infinite series that depends on the value of z. This value results from multiplying the reciprocal semi-major axis with a universal anomaly. The purpose from those functions is to calculate the variation of the universal parameter (variable) using Kepler's equation for different orbits. In this paper, each range for the reciprocal of the semi-major axis, universal anomaly, and z is calculated in order to study the behavior of Stumpff functions C(z) and S(z). The results showed that when z grew, Stumpff functions for hyperbola, parabola, and elliptical orbits were also growing. They intersected and had a tendency towards zero for both hyperbola and parabola orbits, but for elliptical orbits, Stumpff functions

... Show More
Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Der Pharmacia Lettre
Synthesis, characterization and anticonvulsant evaluation of new derivatives derived from 5-methoxy-2-mercapto benzimidazole
...Show More Authors

A new series of 5-methoxy-2-mercapto benzimidazole derivatives were synthesized by the reaction of 5-methoxy- 2-mercaptobenzimidazole with chloroacetic acid and affords 2-((5-methoxy-1H-benzo[d]imidazol-2-yl)thio) acetic acid (1),which on cyclization with acetic anhydride and pyridine gives 7- methoxybenzo[4,5]imidazo[2,1-b]thiazol- 3(2H)-one(2), which on condensation with different aryl aldehydes in the presence of anhydrous sodium acetate in glacial acetic acid, furnishes a arylidene thiazolidinone. The purity of the synthesized compounds was confirmed by melting point and TLC.The structures were established by different spectral analysis such as FTIR,1HNMR, and CHN analysis. The newly synthesized compounds (3a-d) were in vivo evaluated f

... Show More
View Publication Preview PDF
Scopus (4)
Scopus
Publication Date
Thu Jun 23 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Formulation and Evaluation of High-Fat Pellet on Lipid Profiles and Body Mass Index of Male Wistar Rats
...Show More Authors

This study aimed to explore the manufacture of high-fat pellets for obesity induction diets in male Wistar rats and determined its effect on lipid profiles and body mass index. It was an experimental laboratory method with a post-test randomized control group. Formulation of high-fat pellets (HFD) and physico-chemical characteristics of pellets were conducted in September 2019. This study used about 28 male Wistar white rats, two months old, and 150-200 g body weight. Rats were acclimatized for seven days, then divided into four groups: 7 rats were given a standard feed of Confeed PARS CP594 (P0), and three groups (P1, P2, P3) were given high-fat feed (HFD FII) 30 g/head/day. The result showed that the mean fat content of Formula II pell

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Free Head Shear Test on Decomposed Granite Soil
...Show More Authors

The study presents the test results of Completely Decomposed Granite (CDG) soil tested under drained triaxial compression, direct shear and simple shear tests. Special attention was focused on the modification of the upper halve of conventional Direct Shear Test (DST) to behave as free
head in movement along with vertical strain control during shear stage by using Geotechnical Digital System (GDS). The results show that Free Direct Shear Test (FDST) has clear effect on the measured shear stress and vertical strain during the test. It has been found that shear strength
parameters measured from FDST were closer to those measured from simple shear and drained triaxial compression test. This study also provides an independent check on

... Show More
View Publication Preview PDF
Crossref