The aim of this research is subjected to discover The Dictation mistakes which occur
widely in the Arabic Language written by Iraqi – News papers.
The research classified These Mistakes in Three groups as Follows:
1. The first group dealing with distinguishing between the Arabic – letter ) ا ( When Written
or ) أ ( at The beginning The word and as ) ئ ( which differ in meaning from each other .
2. The second group dealing with the writing of The Arabic ) ٙ( and as ) ٛ( at the end of The
word which differ in meaning from each other.
3. The Third group dealing with distinguishing in written The Arabic letter as ) ض( or as ) )ظ
which differ in meaning From each other.
4. The fourth group dealing with Th
Background: This study aims to assess the prevalence of malposed canines among students of College of Dentistry/ University of Baghdad and evaluate the relation between canine malposition and occlusal features.
Material and method: The prevalence of buccally malposed canines was estimated by intra-oral visual examination of 250 young adult subjects (106 males and 144 females), their ages were between 19-24 years.
Results: The prevalence of the mandibular malposed canine (12%) was higher than the maxillary buccally malposed canine (10%). Generally, malposed canines were found higher in f
... Show MoreThe present research is concerned with studying the appearance and essence of meaning in contemporary sculpture by addressing the problematic how to flow of meaning its multiplicity and the flow of its surplus, resulting from the transformations of the artistic form and the variety of its methods which results to a new and different strategies in circulation and aesthetic reception to achieve this task, we have relied on models of modern Iraq sculpture, which fit in its form and raw materials with the concept of phenomenon studied. Therefore, the research topic were divided into four axes:- the first axe included an introduction about the subject. The introduction included the problems of research and its importance, aim repr
... Show MoreA new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis article reveals the first record of the parasitoid wasp, Monodontomerus obscurus Westwood (Hymenoptera, Torymidae) from Iraq. A total of 27 specimens were emerged from mud nests of sphecoid wasp of Sceliphron sp. (Hymenoptera, Sphecidae), that collected from a wall at a residential garden in Dohuk province. A short morphological description is presented.