Preferred Language
Articles
/
FRcu7Y4BVTCNdQwCuFpa
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the state issuing it does not take precedence over the interest of society as it is prevalent in traditional punitive laws (and the Iraqi law among them). In addition to the importance of expanding the legal diagnosis of images of indirect prejudice to social security that takes the form of media, economic and political activity, whether its source is internal or external. And presenting an integrated vision of state security that goes beyond the traditional formula in distinguishing between internal and external state security and considers the holistic character of the concept of state security in the modern era.

View Publication
Publication Date
Tue Jan 26 2021
Journal Name
Plant Archives
THE RESPONSE OF GROWTH OF SOME LAWN PLANTS TO CHEMICAL FERTILIZATION WITH HUMIC ACID UNDER LOW-LIGHT CONDITIONS OF HOUSE GARDEN
...Show More Authors

Shade in house gardens is one of the problems that hinder the growth of lawn and its distribution in the soil, where the types of lawns differ in their durability and adaptation to shade. The research aims to know the resistance of some species of lawn plants to shade and to know the appropriate fertilization procedures that can be followed to reduce the negative effects. The study was conducted in the Amiriya district of Baghdad in a house garden. Three varieties of lawn plants Bermuda, Gazon, and Trifoglio were planted. Five fertilization treatments (contained N and P elements) and the control were used. The sunlight density with the temperature of the study field locations were estimated using the AMT-300 and the vegetation coverage perc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Establish Growth Curve in Light of Body Mass Index for Infertile Women in Baghdad City
...Show More Authors

Objective: To establish growth curve for a sample of infertile women and to assess Body Mass Index.
Methodology: Non-probability (purposive sample) of (100) infertile women, who visit Kamal Al-Samaraee
Hospital/ fertility and IVF center . The data are collected through the use of constructed questionnaire, which
consists of two parts. Part 1: consists of (5) items about demographic characteristics, part 2: consists of (4) items
about reproductive status, descriptive statistical analysis procedures (frequency, percentage, Contingency
coefficients, polynomial cube order).
Results: Revealed that the infertile women in the study group had decrease in their Body Mass Index with aging
(with increase of infertility duration

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 04 2012
Journal Name
The Iraqi Journal Of Veterinary Medicine
Toxicopathological study of aqueous extract of beetle cocoon Larinus maculatus F. on some internal organs in male albino mice
...Show More Authors

The present study was carried out to investigate the effect of oral administration of hot aqueous extract of beetle cocoon Larinus maculatus Faldermann, in a two doses 50 and100mg/Kg/Bw for 25 and 45days respect- tively on some organs such as liver, lung, kidney, intestine, heart, spleen, and brain in male mice Mus musculus. The results indicated that there were toxicopathological changes in many tissues of experimental animals. Histo -pathological changes was dose and period dependent . It was found that the aqueous extract of beetle cocoon has undesirable effect at the administered doses, since the raw extract of this cocoon is currently being used in Folk medicine as treatment for cough, bronchitis in Iraq. This study revealed that the l

... Show More
Preview PDF
Crossref
Publication Date
Wed Sep 22 2021
Journal Name
International Journal Of Corrosion And Scale Inhibition
Synthesis of a CoO–ZnO nanocomposite and its study as a corrosion protection coating for stainless steel in saline solution
...Show More Authors

Reaxys Chemistry database information SciVal Topics Metrics Abstract A novel CoO–ZnO nanocomposite was synthesized by the photo irradiation method using a solution of cobalt and zinc complexes and used as a coating applied by electrophoretic deposition (EPD) for corrosion protection of stainless steel (SS) in saline solution. The samples were characterized using powder XRD, scanning electron microscopy (SEM) and electrochemical polarization. It was also found that the coating was still stable after conducting the corrosion test: it contained no cracks and CoO–ZnO nanocomposites clearly appeared on the surface. SEM showed that the significant surface cracking disappeared. XRD confirmed that CoO–ZnO nanocomposites comprised CoO and Zn

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
Studying the x- ray atomic Scattering form Factor and Nuclear Magnetic Shielding Constant for Be atom in its Excited state (1s2 2s 3s) and the Be - like ions
...Show More Authors

The division partitioning technique has been used to analyze the four electron systems into six-pairs electronic wave functions for ( for the Beryllium atom in its excited state (1s2 2s 3s ) and like ions ( B+1 ,C+2 ) using Hartree-Fock wave functions . The aim of this work is to study atomic scattering form factor f(s) for and nuclear magnetic shielding constant. The results are obtained numerically by using the computer software (Mathcad).

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Numerical Solution for Linear State Space Systems using Haar Wavelets Method
...Show More Authors

In this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (16)
Scopus Crossref
Publication Date
Fri Jan 01 2010
Journal Name
International Journal Of Advanced Intelligence Paradigms
Assessing IRPS as an efficient pairwise test data generation strategy
...Show More Authors

View Publication
Scopus (10)
Crossref (9)
Scopus Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Tue Jan 01 2008
Journal Name
Lecture Notes In Computer Science
IRPS – An Efficient Test Data Generation Strategy for Pairwise Testing
...Show More Authors

View Publication
Scopus (20)
Crossref (7)
Scopus Crossref