Preferred Language
Articles
/
tBfk544BVTCNdQwCT1lL
Suitability of Iraqi legal system for building operation transfer contract in infrastructure construction projects
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
The major psychocutaneous disorders in Iraqi patients
...Show More Authors

KE Sharquie, AA Noaimi, MS Younis, BS Al-Sultani, Journal of Cosmetics, Dermatological Sciences and Applications, 2015 - Cited by 8

View Publication
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of The College Of Education For Women
Transportation movement with containers in Iraqi harbors
...Show More Authors

The use of containers in transportation leads to the reduction in time and effort of the process of loading and unloading of goods as well as protecting the goods from damage and breakage and to reduce the financial costs.
. This development has led also to make changes in the sizes and capacity of ships, therefore changes in the ports must be taken place where they must be provided with an appropriate depth for such vessels, that means the increase in the depth of ports and the establishment of wide storage yards and to provide appropriate mechanisms for handling process.
In this study, the researcher has dealt with this type of transport business in Iraqi ports, namely:
1- Khur Al-Zubair port.
2- Um Qaser port.
In order

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 02 2021
Journal Name
Journal Of Al-frahedis Arts
Public Relations Activities in Iraqi Industrial Companies
...Show More Authors

Due to the impact of industrial companies on the ransformations and developments witnessed by the world in general nd Iraq in particular, especially in the industrial and economic Jonrnal spects, the liberalization of internal and external trade, and the idoption of the open market policy in Iraq, which led to the intensification of competition between industrial companies and heir products and services, and the increase and diversity of the Onumber of alternatives Available to the public on the one hand, and he diversity and change of their desires and needs on the other hand, which was reflected in the reality of those companies and heir products or services, especially in light of the great challenges facing companies and the deteriorat

... Show More
Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
Religious and Regional Honorifics in Iraqi Arabic
...Show More Authors

Honorifics are linguistic expressions which maintain social as well as religious respect to other people. They are linguistic techniques which express politeness to other interlocutors. Semantically speaking, honorifics are of two types: al-Laqab (title) and al-Kuniya (teknonyms) following a specific word order. They form part of the Arab recognitions and are mold into their social and communicative competence.

      The study focuses upon religious and regional honorifics which convey deference and respect. It assumes that religious and cultural recognitions play vital roles in formulating and embedding the sense of honorifics. It is hypothesized that Arab people express respect to religious personalitie

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2009
Journal Name
Al-kindy College Medical Journal
Serum Zinc in Iraqi Acute Leukemic Patients
...Show More Authors

Background: Leukemia is a group of malignant disorders
associated with increased numbers of blood white blood
cells. Acute leukemia occurs at all ages. Because zinc
influences many body systems and functions, zinc is an
essential nutrient for tissue growth, cellular division,
protein synthesis DNA and RNA replication it also ought to
play a critical role in the growth of tumor. In this study,
serum zinc was estimated in leukemic patients and
compared with healthy subjects.
Methods: The subjects in the present study were; fourtyfour depressed patients aged (14-48 year), thirty-one
apparently healthy subjects were selected as control group.
Their sex and age were comparable to that of patients.
Determin

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The technical mediator in contemporary Iraqi formation
...Show More Authors

 The current research (technical mediator in contemporary Iraqi painting) dealt with the concept of technical mediator in contemporary arts and its role in the qualitative transformation in art, the diversity of discoveries in technical media that artists use in their artistic achievement, and the extent of their impact on contemporary Iraqi painting, where the research problem was identified (what is The nature and role of technical media in showing works in contemporary Iraqi painting) and (What are the intellectual and aesthetic concepts of media and techniques as references for contemporary art in Iraq). The second topic dealt with technical media and their impact on the plastic arts, and the third topic focused on the technical med

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Dewatering System Control by MATLAB Software
...Show More Authors

The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref