Preferred Language
Articles
/
-RYRzosBVTCNdQwCjd_4
The Effect of Different Furrow Depths and Speeds of Machinary Units Using A Locally Assembled Combine Implement on Planting Maize
...Show More Authors

View Publication
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
The Prophetic Speeches (Hadith) on Sciences and Scientists: Application of the "Text from Text and D+" Theory
...Show More Authors

This study aims to apply the theory of "Text from Text and the Plus Dimension" in the analysis of the Prophetic discourse found in the section on the virtues of knowledge and scholars from Imam Sahih al-Bukhari's book. This section covers several topics, including the virtue of gathering for the sake of learning, the superiority of a scholar over a worshipper, the excellence of jurisprudence in the religion of Allah, the acquisition of knowledge through the passing away of scholars, the merit of inviting people to Allah, the continuing benefit of beneficial knowledge after a scholar's demise, the warning against seeking knowledge for purposes other than Allah, and the Prophet seeking refuge from knowledge tha

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Relationship Between Blood Types And The Kind Of Food Intake And Its Impact on Human Health
...Show More Authors

This Study aimed To know The relation between Types of blood and health problems which human Suffered from , and the effect of food intake on health.
Samples of study contained 269 person aged between 30 – 70 years which choiced randomly for sex , we are take all in formation about samples of study by form paper contian sex , age, type of blood , weight (kg) , height (cm) , smoking or.not , sporting or not, problems in digestive tract , sensitivity for foods , heart problems , ratio of cholesterol in blood , Sinusitis , Asthma , diabetic meliuts , arritable bowel syndrome , diaherra , problems in kidney and urination , hypertension , anemia , alternation in liver function , arthritis with form record in daily food intake and its ade

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
The conversations of reason and thinking as stated in the Sunnah and its impact on human behavior
...Show More Authors

The Sunnah of the Prophet has a great impact in building human behavior, and the formation of Islamic thought, has worked to spread science in all of Egypt, as it carried to the people of the eternal prophecy of the love of science, it was a source of knowledge and civilization. It is a generous source, a rich source of the Islamic nation, always tender, and renewed benefit, which is not only a source of legislation and language but is a source of guidance for thought and guidance of behavior, and the Hadith The importance is obvious In the integration of Islam, and show aspects of human integration in the personality of Mustafa , and the Muslims are interested in talking - collected and codification -, and made the effort of the cent

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 03 2018
Journal Name
Baghdad Science Journal
Influence of Lead Exposure in the Expression of Calmodulin – Related Genes: A Preliminary Study on Workers Working in Industry of Batteries, In Iraq
...Show More Authors

Most pathological effects of lead on the body are due to ability of lead to bind with important cellular molecules of various tissues and organs leading to formation abnormal molecules and thus to emergence of pathological conditions. To evaluation the risk to the health status of Iraqi workers who work in the batteries industry, expression of three types of calmodulin related genes were examined. Blood samples were collected from worker working in Iraqi industry of batteries (located in Al-Waziriya), then RNAs extraction were done thereby gene expression for Calcium/Calmodulin- dependent protein kinase2 (CaMKK2), C-X-C Chemokine receptor 4 (CXCR4) and mitogen activated protein kinase kinase 6 (MAP2K6) was done for each sample by using RT-q

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref