Preferred Language
Articles
/
nBfJsI0BVTCNdQwCHRhN
The Civil Liability of Hotels toward Victims of Terrorist Acts Occurring on Their Premises
...Show More Authors

At a time when any tourist in the world wants a trip to reload his energy and enjoy peace and quiet and engage in adventures in a safe environment, terrorism comes to disturb him on that journey through operations aimed at the tourist and entertainment destinations, such as shops, restaurants, cafes and hotels Is the orbit of research) for many reasons. The security measures taken by hotels play an important and fundamental role in preventing or limiting these terrorist operations. At the same time, while some hotel administrations are constantly seeking to improve these measures to preserve the safety of their guests and visitors, In spite of the high number of attacks on hotels since 2001 and today. This research is intended to highlight the extent to which civil hotels are responsible for the victims of terrorist operations.

View Publication
Publication Date
Sat Jan 03 2026
Journal Name
Journal Of Physical Education
The Effect of Using Mental Maps On Cognitive Achievement In Rhythmic Gymnastics
...Show More Authors

View Publication
Publication Date
Thu Jun 01 2023
Journal Name
South Asian Journal Of Social Sciences & Humanities
The Impact of University Internal Environment, Development Talents on Sustainable Competitive Advantage.
...Show More Authors

There is a need to make serious efforts For Iraqi universities to be in the ranks of advanced universities in the world. This requires attracting teaching talents and providing an incubating environment for them. Therefore, the objective of the research was to explore the influence of (the environment, the development of talents) on sustainable competitive advantages. The research followed the descriptive approach and used the quantitative analysis method. Almaqaal university is the field of study. The study sample size (of 76 people), from almaaqal university teachers, and the sample comprised the available staff specialized in the field of Teaching and research. The questionnaire was utilised as a data collection tool and (spss) program w

... Show More
Publication Date
Fri Jan 01 2010
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Evaluation of The Nuclear Data on(α,n)Reaction for Natural Molybdenum
...Show More Authors

The cross section evaluation for (α,n) reaction was calculated according to the available International Atomic Energy Agency (IAEA) and other experimental published data . These cross section are the most recent data , while the well known international libraries like ENDF , JENDL , JEFF , etc. We considered an energy range from threshold to 25 M eV in interval (1 MeV). The average weighted cross sections for all available experimental and theoretical(JENDL) data and for all the considered isotopes was calculated . The cross section of the element is then calculated according to the cross sections of the isotopes of that element taking into account their abundance . A mathematical representative equation for each of the element

... Show More
Publication Date
Sat Jan 03 2026
Journal Name
Al-anbar University Journal Of Law And Political Sciences
The Effect of E-Government on Public Facility Management Methods (Comparative Study)
...Show More Authors

View Publication
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of Assessment Techniques on EFL Learners’ achievement in TOEFL Test
...Show More Authors

While many educators are highly focused on state test, it is important to consider that
over the course of a year, instructors can build in many opportunities to assess how learners
are learning. Therefore, assessment techniques are considered a good method to get benefit
for both instructors and learners in the process of teaching and learning. The sample consists
of 27 learners who participated in TOEFL training course in the Development and Continuous
Education Centre. Validity and reliability were verified.
To fulfill the aims and verify the hypothesis which reads as follows” It is hypothesized
that the TOEFL learners' scores will not be increased after TOEFL course training.” T-test
for two dependent samp

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 03 2008
Journal Name
Kufa Med. Journal
Synrgistic Activity of Peganum Harmala Extract and Pentostam on the Leishmania Donovania
...Show More Authors

Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
The Effect of Cognitive Strategies on Iraqi EFL College Students’ Writing Anxiety
...Show More Authors

Writing in English language demands both mental skills and a suitable level of language proficiency. Some studies showed that writing anxiety has an impact on the acquisition of language learning. This study; however, teaches the cognitive strategies (PLAY & WRITE) as a writing strategy, so as to decrease students’ use of it when experiencing writing anxiety at the academic writing level. The sample has been (100) second-stage Department of English learners at the College of Education (Ibn –Rushd), in the University of Baghdad-Iraq. They have been randomly selected and divided into experimental and control groups; (50) students in each group. To achieve the objective of the study, SLWAI questionnaire has been distributed to the e

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Mar 17 2025
Journal Name
International Journal Of Civil Engineering
Understanding the Role of Nanosilica and Nanoalumina on Hot Mix Asphalt Performance
...Show More Authors

This study explores the role of nanomaterials in the performance of asphalt binders and mixtures. Two commonly available nanomaterials, i.e., nanosilica (NS) and nanoalumina (NA), were used at contents of 0%, 2%, 4%, 6%, and 8% by weight of asphalt binder. A set of experiments was carried out at the binder level to investigate properties such as penetration, softening point, aging-related mass loss, nanomaterial dispersion (storage stability), and workability (rotational viscosity). In addition, the suitability of NS and NS was also assessed through the testing of nanomodified asphalt mixtures, which focused on Marshall properties, the resilient modulus, moisture susceptibility, permanent deformation, and fatigue resistance. The findings in

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Oct 06 2022
Journal Name
2022 9th International Conference On Electrical Engineering, Computer Science And Informatics (eecsi)
On the Performance of a Composite Right Left Hand Electromagnetic Bandgap Structure
...Show More Authors

This paper presents the design and analysis of composite right left hand (CRLH) electromagnetic bandgap (EBG) structure. The proposed unit cell is consistent of a dielectric substrate with dimensions of 5×5×1 mm 3 made of FR4-Epoxy with εr = 4.4 underneath of a conductive patch with dimensions of 4.4×4.4mm 2 . The unit cell is structured to perform a negative permittivity (ε) and negative permeability (µ) in different bands. The proposed unit cell is developed to 5G systems in the sub-6GHz bands. In this work, a complete analysis of the unit cell in terms of Sparameters, constitutive parameters and refraction index are evaluated using HFSS simulation package based on Finite Element Method (FEM).

View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref