The skull is one of the largest bones in the body. It is classified into flat bones that maintain the important organic structures; which are the brain, eyes, and tongue. The skull is a strong support for preserving these organs but they are various according to the type of animals and the environments in which they live and the nature of their nutrition. There are many differences among living organisms in terms of the bones in the skull, their difference or disappearance and their length in the shape of the head. The samples were taken from the scientific storage in the Iraq Natural History Research Center and Museum; Cape hare Lepus capensis (Linnaeus, 1758) and Red fox Vulpes vulpes (Linnaeus, 1758) and the study was conducted o
... Show MoreKE Sharquie, HM Al-Hamamy, AA Noaimi, IA Al-Shawi, Journal of the Saudi Society of Dermatology & Dermatologic Surgery, 2011 - Cited by 9
The other day in the Holy Quran and the four Gospels
The present study is about tales attributed to certain people and are not traded. Such a study has a great importance for religion scholars and conveyors of hadiths since it is considered as one of the important sources of Islamic legislation that represent the Holy Sunna, and the majority of the recent study is concerned with non-traded tales of religion scholars. The research starts with the definition of such type of tales and then its types, conditions, legality, exceptions, and the benefit from studying such matter. It is mainly concerned with the opinions of the Imami and Hanafi region scholars respectively, and with comparing between the two doctrines i.e. Imami and Hanafi at the end of each
... Show MoreBackground: Breast cancer is the most common cancer in Iraq and the United Kingdom. While the disease is frequently diagnosed among middleaged Iraqi women at advanced stages accounting for the second cause of cancer-related deaths, breast cancer often affects elderly British women yielding the highest survival of all registered malignancies in the UK. Objective: To compare the clinical and pathological profiles of breast cancer among Iraqi and British women; correlating age at diagnosis with the tumor characteristics, receptor-defined biomarkers and phenotype patterns. Methods: This comparative retrospective study included the clinical and pathological characteristics of (1,940) consecutive female patients who were diagnosed with invasive b
... Show MoreTo decrease the impact on the environment of building waste, the recycled aggregate may be used in various sustainable engineering applications, such as roller compacted concrete pavement (RCCP). This research examined how using recycled aggregate as a partial replacement for natural aggregate as coarse or fine affected the mechanical properties of roller-compacted concrete pavement. The recycled aggregate was crushed and sieved to coarse and fine aggregate before being used in the roller-compacted concrete pavement. Compressive strength, splitting tensile strength, and flexural strength were all evaluated after the samples were prepared at 28 and 90 days of curing. According to the study's findings, the partial replacem
... Show MoreIn this study the thermal conductivity of the epoxy composites were characterized as function of volume fraction, particle size of fillers and the time of immersion(30,60,90)days in water .Composites plates were prepared by incorporating (bi-directional) (0º-90º) glass fiber and silicon carbide (SiC) particles of (0.1,0.5,1)mm as particle size at (10%,20%,30%,40%) percent volume in epoxy matrix.
The composites shows slightly increase of the thermal conductivity with increasing volume fraction, particle size and increase with increasing the days of immersion in water. The maximum thermal conductivity (0.51W/m.K) was obtained before the immersion in water at 90 days for epoxy reinforcement by bi-directional glass fiber and SiC particl
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThis research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f
... Show More