Preferred Language
Articles
/
whasCYcBVTCNdQwClDCt
Identification of Key Criteria of Selecting the Delivery System and Type of Contract in Construction Projects
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jan 13 2022
Journal Name
Iraqi Journal Of Science
(Macrolides –Lincosamides - Streptogramins) and Vancomycin Resistance Phenotypes of Staphylococcus aureus Isolated From Clinical Samples by Using Vitek 2 Compact System
...Show More Authors

The study was carried out to investigate MLS and vancomycin resistance phenotypes in S.aureus isolated from different clinical samples .A total of 40 of S.aureus isolated from Baghdad hospitals from different clinical samples such as blood , urin, sputum ,skin and ear swabs used to identified MLS and vancomycin resistance phenotypes.The susceptibility pattern showed that 3 islolates (7.5) % constitutive resistance to erythromycin ,clindamycin and streptogramins (cMLS) while 9 isolates (22.5)% gave inducible resistance to erythromycin ,clindamycin and streptogramins (iMLS) , 10 isolates (25)% showed resistance to erythromycin and sensitive to clindamycin (M phenotype) and 18 isolates (45)% of S.aureus isolates had resistance phenotype to

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Developing a Predictive Model and Multi-Objective Optimization of a Photovoltaic/Thermal System Based on Energy and Exergy Analysis Using Response Surface Methodology
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The role of governors and Arab workers in helping the needy and the poor in the eras Rashidin and Umayyad
...Show More Authors

The research deals with financial and supplies support from the rulers and governors of the
Arab cities and Islamic regions to the poor of common people and the poor of their own . The
Islamic Arab community was characterized , since the prophet's era , with great humanistic
features that formed the cultural characteristic which organized individual's economic life .
The prophet , senior Muslims and the rich cared a lot about this side . There was a large
variation in the degrees of wealth and poverty in the Muslim Arab community as a heritage
from the pve – Islamic society where there is no concern about helping the needy and poor .
Thus , the research sheds light on the different forms of help offered by rulers a

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The impact of moving the educational activities in the conservation of literary texts and the development of literary taste in the fifth grade students moral: The impact of moving the educational activities in the conservation of literary texts and the development of literary taste in the fifth grade students moral
...Show More Authors

Abstract
The study was conducted in Baghdad and aimed to:
The impact of moving the educational activities in the conservation of literary
texts and the development of literary taste in the fifth grade students moral "by
verifying the validity of hypotheses Elsafreeten following forms:
The first hypothesis:
- There are no differences in women with statistical significance between means
of scores of students three experimental groups, the experimental group first
used upstream activities in the teaching material of literature and texts, the
second experimental group used the activities of building in the teaching
material itself and the experimental group the third use activities concluding
taught the same

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Semantic Based Video Retrieval System: Survey
...Show More Authors

In this review paper a number of studies and researches are surveyed, in order to assist the upcoming researchers, to know about the techniques available in the field of semantic based video retrieval. The video retrieval system is used for finding the users’ desired video among a huge number of available videos on the Internet or database. This paper gives a general discussion on the overall process of the semantic video retrieval phases. In addition to its present a generic review of techniques that has been proposed to solve the semantic gap as the major scientific problem in semantic based video retrieval. The semantic gap is formed because of the difference between the low level features that are extracted from video content and u

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Dewatering System Control by MATLAB Software
...Show More Authors

The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.

View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Computers And Electrical Engineering
Automatic illness prediction system through speech
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Traveling Wave Cylindrical Induction Heating System
...Show More Authors

The paper deals with the traveling wave cylindrical heating systems. The analysis presented is analytical and a multi-layer model using cylindrical geometry is used to obtain the theoretical results. To validate the theoretical results, a practical model is constructed, tested and the results are compared with the theoretical ones. Comparison showed that the adopted analytical method is efficient in describing the performance of such induction heating systems.

View Publication Preview PDF
Crossref