Preferred Language
Articles
/
jrashc-387
استخدام استخدام نمط الترحيل الكهربائي لبروتينات مصل الدم لتصنيف نوعي الحمامة الفاختة (Streptopelia decaocto) والحمامة الضاحكة
...Show More Authors

     استهدف البحث فصل بروتينات مصل دم كل من الحمامة الفاختة (Streptopelia decaocto) والحمامة المطوقة (Streptopelia senegalensis) بطريقة الترحيل الكهربائي كطريقة تصنيفية مابين النوعين . تم جمع 23 حمامة فاختة (13 ذكر و10 إناث) و 15 حمامة ضاحكة (8 ذكر و5 إناث) من مناطق مختلفة من مدينة بغداد ، وتم سحب0.1 مل من الدم من الوريد الموجود

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 14 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Personal Digital Assistant Acceptance in Nursing Education
...Show More Authors

Objective:To measure the acceptance level of the Personal Digital Assistance (PDA)’suse among nursing students as a tool of education in the Kingdom of Saudi Arabia. Methodology: Eighty-nine nursing students participated in this cross-sectional descriptive study by completing a questionnaire based on the Technology Acceptance Model (TAM) by Davis. Two dimensions were explored and evaluated; (1) the applicability of the TAM model in assessing this technology; and (2) the overall percentage of students’ agreement on the different TAM variables. Results: This study presented significant positive influence bet

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
استخدام الضمائر انت وانتم في الآدب الروسي الكلاسيكي
...Show More Authors

استخدام الضمائر انت وانتم في الآدب الروسي الكلاسيكي

View Publication Preview PDF
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Determinants of using experimental groups and choosing reasons in psychological researches
...Show More Authors

Until The Second Half Of Nineteenth Century  , Psychology Depended On Philosophy In Its Experiences Which Means It Depend On Individuals Feelings Toward Psychological Experiences And Rapid Observation . As For The Scientific Organized Experimentation And Observation By Machines Have Been Used Later   .

The Experimentation Looking For The Cause Of  Phenomena And How Is That Happened   Also Reveal The Causal Relationship Between Among Phenomena . The Experiences In Psychology Field Include In Its Simplest Form Only One Variable ( Effective) Which Is Called Independent Variable As Well As Another Variable ( Affected )   That Called  Dependent Variable .

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Use Pareto Chart to diagnose the level of quality of municipal services
...Show More Authors

The aim of the study is to study the quality of services in a sample of the municipalities of Baghdad governorate and identify the deviations in their operations and provide solutions to address the causes of deviations. The research field aims at the same activity related to municipal services and their quality and analysis using some tools for continuous improvement to identify the authorities responsible for the delay and quality of services. In the future, the importance of research is shown by the use of these tools and their use and their application to the data of the directorates (sample of the study) to diagnose and treat problems, especially that they include statistical methods that are clear and easy to understand the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Using some Natural Minerals to Remove Cadmium from Polluted Water
...Show More Authors

Water scarcity is one of the most important problems facing humanity in various fields such as economics, industry, agriculture, and tourism. This may push people to use low-quality water like industrial-wastewater. The application of some chemical compounds to get rid of heavy metals such as cadmium is an environmentally harmful approach. It is well-known that heavy metals as cadmium may induce harmful problems when present in water and invade to soil, plants and food chain of a human being. In this case, man will be forced to use the low quality water in irrigation. Application of natural materials instead of chemicals to remove cadmium from polluted water is an environmental friendly approach. Attention was drawn in this research wor

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Economics And Administrative Sciences
Using Statistical Methods to Increase the Contrast Level in Digital Images
...Show More Authors

This research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram, and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods.

 

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the method of parsing anomalous valueIn estimating the character parameter
...Show More Authors

In this paper the method of singular value decomposition  is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.

View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of The College Of Languages (jcl)
Investigating EFL Iraqi College Students' Awareness of Euphemistic Expressions
...Show More Authors

All over the world and in different societies and cultures , people are always looking for different ways of favourable , gentle smooth and soft communication .The 'powerful linguistic devices ' that are embedded in the daily English language is called "euphemism". It plays an important and vital role in daily communication. It represents a significant part of English . It is used to express any aspect of everyday realities such as the business world , mass media , etc. The comprehension of such realities can not be verified unless a reasonable command of euphemism is achieved.
Euphemism is defined according to various perspectives and views. It is " that figure of speech which consists in the substitution of a word or expression of c

... Show More
View Publication Preview PDF