Preferred Language
Articles
/
shZfSIcBVTCNdQwCTkGU
Distribution and localization of ground substance of carbohydrate group in an inflammatory and phenytion induced gingival enlargement using histochemical method
...Show More Authors

Publication Date
Sat Aug 10 2024
Journal Name
Full Text Book Of Istanbul Congress 7
NARRATIVE TECHNIQUES AND THEIR APPLICATIONS IN ANDALUSIAN MAQAMAT/ EID MAQAMAT AS AN EXAMPLE
...Show More Authors

View Publication
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Societal awareness and its role in building the Arab state: an intellectual vision:
...Show More Authors

It is no secret to everyone that the Arab individual suffers from poor self-awareness and political awareness, which made the state and the importance of its existence and preserving its institutions not among his interests, which made researchers wonder about the possibility of strengthening it and the extent of its impact on the future of building the contemporary Arab state, so the study attempted Addressing the issue of community awareness and its impact on building the state through a clear intellectual vision that blended what is social and political to define the concept of community awareness and highlight its importance and role as a basic pillar in shaping and building modern Arab countries. In the Arab world and ways to enhanc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
The most important and important rule in the Quranic perspective "An applied study"
...Show More Authors

Abstract

    All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DISTRIBUTION OF HARD TICK SPECIES AMONG SHEEP OVIS ARIES L. IN AL-ANBAR PROVINCE, WESTERN DESERT OF IRAQ
...Show More Authors

The Middle East fat tailed sheep Ovis aries L. examined within the boundaries of Al-Anbar province, western Iraq was found to acquire seven species of ixodid ticks namely, Hyalomma
anatolicum, H. excxavatum, H. marginatum turanicum, H. detritum, Hyalomma sp., Rhipicephalus turanicus and R. s. sanguineus. The results discussed with the pertinent
literature.

View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
...Show More Authors
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
View Publication
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jan 30 2026
Journal Name
Al–bahith Al–a'alami
The Problemic of the ambiguous relationship between the media and terrorism, and the problems arising from… An exploratory study of a sample of journalists, writers and researchers in Baghdad
...Show More Authors

This study examined the problematic of the ambiguous relationship between the media and terrorism and the problems that result from press coverage of terroristic incidents. The paper sought to show the classification and confrontation of such incidents had been established from the point of view of a sample of media professionals, researchers and writers who are frequenters of Al-Mutanabi Street in Baghdad. The media outlets that carry this coverage would not give up their media mission as well as the terrorists would not be given an opportunity to take advantage of this coverage in achieving their goals and objectives. Furthermore, the terrorist organizations would have no chance to exploit these means to deliver their terroristic messa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 06 2012
Journal Name
Al-rafidain Journal For Sport Sciences
Analysis study (Guessing and techntion of self consistent degree) in choosing the perfect way from different method for two kinds rotation (orthogonal & oblique) in factore
...Show More Authors

The factorial analysis method consider a advanced statistical way concern in different ways like physical education field and the purpose to analyze the results that we want to test it or measure or for knowing the dimensions of some correlations between common variables that formed the phenomenon in less number of factors that effect on explanation , so we must depend use the self consistent that achieved for reaching that basic request. The goal of this search that depending on techntion of self consistent degree guessing for choosing perfect way from different methods for (orthogonal & oblique) kinds in physical education factor studies and we select some of references for ( master & doctoral) and also the scientific magazine and confere

... Show More
Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Egyptian Journal Of Radiology And Nuclear Medicine
Spectrum of CT appearance and CT severity index of COVID-19 pulmonary infection in correlation with age, sex, and PCR test: an Iraqi experience
...Show More Authors
Abstract<sec> <title>Background

Since June 2020, an explosion in number of new COVID-19 patients has been reported in Iraq with a steady increment in new daily reported cases over the next 3 months. The limited number of PCR kits in the country and the increment in the number of new COVID-19 cases makes the role of CT scan examinations rising and becoming essential in aiding the health institutions in diagnosing and isolating infected patients and those in close contacts. This study will review the spectrum of CT pulmonary changes due to COVID-19 infection and estimate the CT severity score index and its relation to age, sex, and PCR test results

... Show More
View Publication
Scopus (21)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref