Preferred Language
Articles
/
yBYXsIsBVTCNdQwCodb7
HYPERSPECTRAL SPECTROSCOPY TO DETECT DIFFERENT RESPONSES OF TWO SOYBEAN (GLYCINE MAX) CULTIVARS TO CHARCOAL ROT (MACROPHOMINA PHASEOLINA) TOXIN
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jul 13 2021
Journal Name
Journal Of Craniofacial Surgery
Comparison of Two Botulinum Toxin Injection Methods for Treatment of Excessive Gingival Display
...Show More Authors

Background: Hyperfunction of the muscles of the upper lip is considered as the most common cause of excessive gingival display (EGD). The aim of this study was to demonstrate the effectiveness of botulinum toxin (BT) injection as a conservative treatment for EGD due to muscular hyperfunction and to compare the outcome of 2 injection methods. Material and methods: This study included 40 participants who were randomly assigned into 2 groups of 20 each, The first group received 2.5IU BT injection at 1 point per side (2-points group), while the second group received a total of 5 IU of BT at 2 points per side (4-points group). The outcome variables were the reduction in the central and lateral gingival display expressed as the difference between

... Show More
View Publication
Scopus (3)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jul 16 2020
Journal Name
Diyala Agricultural Sciences Journal
FIELD EMERGENCE IN PRIMED SEED OF SORGHUM CULTIVARS TO TOLERATE DROUGHT STRESS
...Show More Authors

An experiment was carried out in pots under open field conditions in the fall seasons of 2017 and 2018 at the College of Agricultural Engineering Sciences, University of Baghdad, for improving field emergence and drought stress tolerance in sorghum. Three factors were studied. 1st factor was three cultivars (Inqath, Rabeh and Buhoth70). 2nd factor was primed and unprimed seed. 3rd factor was represented by the irrigation intervals every 2, 4 and 6 days. Randomized complete block design with four replicates was used. The results showed that Buhoth 70 cultivar had a significant superiority compared to others in traits of the first and final count of emergence, emergence energy and emergence rate index (54.2%, 26.7%, 1.747 and 70.7 % d

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Mar 30 2013
Journal Name
College Of Islamic Sciences
 The responses of the army overseer to the grammarians in the preposition section
...Show More Authors

This is a contextual study in face and isotope science, and I have made it in one of the terms faces and isotopes, which is the word (bad). Quranic also, and that is at every aspect they mentioned.
The nature of the research required that it be divided into three sections:
The first topic: I singled it out to show the types of contextual connotations.
- The second topic: I singled it out to define the word bad and its meaning.
- The third topic: I devoted it to the study of the word bad and explaining the significance of the Quranic context on the additional meaning and the original meaning.
Conclusion: It mentioned the most important results, which are:
1- The significance of the Quranic context is one of the most impo

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Using Fuzzy Clustering to Detect the Tumor Area in Stomach Medical Images
...Show More Authors

Although the number of stomach tumor patients reduced obviously during last decades in western countries, but this illness is still one of the main causes of death in developing countries. The aim of this research is to detect the area of a tumor in a stomach images based on fuzzy clustering. The proposed methodology consists of three stages. The stomach images are divided into four quarters and then features elicited from each quarter in the first stage by utilizing seven moments invariant. Fuzzy C-Mean clustering (FCM) was employed in the second stage for each quarter to collect the features of each quarter into clusters. Manhattan distance was calculated in the third stage among all clusters' centers in all quarters to disclosure of t

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Cybersecurity And Information Management
A New Automated System Approach to Detect Digital Forensics using Natural Language Processing to Recommend Jobs and Courses
...Show More Authors

A resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Sep 30 2011
Journal Name
Iraqi Journal Of Science
Using the band ratio classification method to detect the regions that need to remove sedimentation in Tigris River
...Show More Authors

LandSat Satellite ETM+ image have been analyzed to detect the different depths of regions inside the Tigris river in order to detect the regions that need to remove sedimentation in Baghdad in Iraq Country. The scene consisted of six bands (without the thermal band), It was captured in March ٢٠٠١. The variance in depth is determined by applying the rationing technique on the bands ٣ and ٥. GIS ٩. ١ program is used to apply the rationing technique and determined the results.

View Publication
Publication Date
Wed Jul 30 2008
Journal Name
College Of Islamic Sciences
Al-Aini's grammatical responses to Ibn Malik in his book Umdat Al-Qari
...Show More Authors

It is from the greatness of God Almighty and from him that he facilitated for me to delve into the immersion of the hadith of the Prophet in my doctoral dissertation, then I found it a fertile ground for the cultivation of scientific results.
Through this work, I chose the topic (Replies of Al-Aini to Ibn Malik in his book Umdat Al-Qari Sharh Sahih Al-Bukhari) because of its scientific impact, as such topics inspire in the soul of the follower and the student a lot of contemplation and great care to understand the texts and then come up with a result that is almost close. It is correct, and my current situation in this research is the condition of many scholars, not without errors and omissions. Whatever was correct is by the grace of

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Auditing the comprehensive electronic banking system to detect operational business risks (applied research)
...Show More Authors

Abstract:

                In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (118)
Crossref (111)
Scopus Clarivate Crossref