The present study aims at identifying the styles, procedures of Iraqi universities to avoid plagiarism and evaluate these steps, also to evaluate the form prepared by the Directory of Scientific Supervision and Evaluation, Ministry of Higher Education and Scientific Research. The study uses documentary style, 150 teachers in the following colleges (Education Ibn Rushd, Languages and Arts) in university of Baghdad whom already used the aforementioned list were the sample of the study and they asked to give their opinions about the list.The study consists of five sections, first one deals with general view, second explains plagiarism and its types, shapes and reasons,third tackles with ways of detecting plagiarism, its programs, consequences and avoidance, while the fourth one deals with plagiarismin Arabic and international institutes, the last one represents results, recommendations and suggestion. The main results are: 1- There is no available database of theses and dissertations for all Iraqi Universities. 2- One list for all majors humanities and scientific is an obstacle due to the huge differences between two majors in the methodology and using the references.
Background: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreContrary to deconstruction and its destructive pursuit, the concept of undermining the familiar seeks to refute the constants and its known limitations. It is done through the process of receiving and what is imposed by the formation of the word or text or the structural and design structure in general, along with the Arabic calligraphy in particular. This is based on the recipient's understanding and interpretation of the dual phenomenon and the content's manifestation. More accurately, the disclosure of its reality through its expressive phenomenology; for that sake, the research was devoted to studying “undermining the familiar and embodiment content in Arabic calligraphy” including four chapters. The first chapter comprised
... Show MoreIraq is considered one of the countries most susceptible to the negative impacts of climate change. According to international reports, it is classified as among the top five most affected by climate change in the world, leading to economic resource shortages and an increase in water scarcity, which exposes societal stability in Iraq to a threat. This may result in social disintegration and civil conflicts, so climate changes are considered one of the most dangerous crises affecting societal stability in Iraq during this stage. In this context, the research attempts to trace the causes of climate change and their effects on societal stability in Iraq and suggest some necessary measures to confront them in the future. The resea
... Show MoreChannel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreBackground/Aim: Psoriasis is a persistent systemic disorder characterised by chronic inflammation and linked to multiple comorbidities, including arthritis, cardiometabolic disorders, obesity and hyperlipidaemia. Objective of this study was to identify the relationship of abnormal lipid profiles and psoriasis, as well as to pinpoint factors that correlate with disease severity. Methods: A cross-sectional study was carried out at the dermatology clinic over 6 months from the 1 August 2024 to the 1 February 2025. Patients aged 15 years and above with a diagnosis of psoriasis were enrolled. For each patient two sets of data were collected, demographical characteristics (age, sex, disease duration and the body mass index (BMI)) and the
... Show MoreObjective: Schiff’s and Mannich bases of isatins are an important group of heterocyclic compounds which are of great importance in medicinal chemistry as antimicrobial agents. In the vision of these facts, new bis-Schiff bases and Mannich bases of isatins were synthesized. Methods: Three different bis-Schiff bases (3a-c) have been synthesized by reacting isatin, 5-fluoroisatin and 5-methoxy isatin with thiophene-2- carboxaldehyde using hydrazine hydrate to link between the carbonyl compounds, and then these bis- Schiff bases were condensed with two different secondary amines (piperidine and morpholine) separately, and formaldehyde to form the Mannich bases (4a-c and 5a-f), respectively. Results: The structures of the newly synthesized com
... Show More(Use of models of game theory in determining the policies to maximize profits for the Pepsi Cola and Coca-Cola in the province of Baghdad)
Due to the importance of the theory of games especially theories of oligopoly in the study of the reality of competition among companies or governments and others the researcher linked theories of oligopoly to Econometrics to include all the policies used by companies after these theories were based on price and quantity only the researcher applied these theories to data taken from Pepsi Cola and Coca-Cola In Baghdad Steps of the solution where stated for the models proposed and solutions where found to be balance points is for the two companies according to the princi
... Show More