Preferred Language
Articles
/
MWEmKJkBdMdGkNqj6xRf
Anatomical differences in the biliary duct system between canines and felines: A review article
...Show More Authors

The liver is one of the largest glands in the digestive system and performs 13 various functions, including the secretion of hormones and enzymes. The gallbladder serves as a storage reservoir for secretions before they are released into the digestive system through the duodenum. The bile ducts branch from the liver’s lobes and ultimately connect to the digestive system, making this structure significant and distinct among different animal species. This review focuses on the differences between dogs and cats, highlighting the importance of these differences from both health and pathological perspectives. After conducting a detailed scientific review of the biliary tree in dogs and cats, we concluded that cats are more susceptible to the disease than dogs. We recommend conducting extensive radiological studies to determine which species experience cases of this disease more frequently. Additionally, it would be beneficial to explore crossbreeding with another species with a biliary tree structure that offers protection against certain diseases affecting the liver and bile.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The impact of organizational learning in building intellectual capital in public organizations: comparative research between the universities of Baghdad and al-Mustansiriya
...Show More Authors

   Organizational learning is one of the most important means of human resource development in organizations, but most of the organizations, especially public ones do not realize the importance of organizational learning enough, and estimated his role accurately in building intellectual capital, the resource competitive importantly for organizations of the third millennium and who suffers is other end of lack of understanding of its meaning and how to prove its presence and measured in public organizations, so there is the need for this research, which aims to investigate the effect of organizational learning its processes (knowledge acquisition, Information transfer, Interpreting the information, Organizational me

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Sep 02 2022
Journal Name
Resmilitaris
Analysis of the relationship between the internal public debt and the public budget deficit in Iraq for the period from 2010-2020
...Show More Authors

The study aimed to analyze the relationship between the internal public debt and the public budget deficit in Iraq during the period 2010–2020 using descriptive and analytical approaches to the data of the financial phenomenon. Furthermore, to track the development of public debt and the percentage of its contribution to the public budget of Iraq during the study period. The study showed that the origin of the debt with its benefits consumes a large proportion of oil revenues through what is deducted from these revenues to pay the principal debt with interest, which hinders the development process in the country. It has been shownthat although there was a surplus in some years of study, it was not

... Show More
Scopus
Publication Date
Mon Feb 18 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Control Over The Medical Evacuation Program in light of the Government's Accounting System
...Show More Authors

The accounting system of government is considered an important tool to follow up the financial transactions that reflect the activities of governmental units and by which the useful information for estimating governmental annual revenues and expenditures are provided through the state public budget because it is an information system that provides detailed past performance, as well as measures the efficiency of the governmental agencies performance in implementing the budget, and the of success governmental units is measured through the type of services and programs offered, their size and the possibility of achieving the objectives assigned to them. The medical evacuation program is one of the medical and curative health services provid

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison Between Maximum Likelihood Method And Bayesian Method For Estimating Some Non-Homogeneous Poisson Processes Models
...Show More Authors

Abstract

The Non - Homogeneous Poisson  process is considered  as one of the statistical subjects which had an importance in other sciences and a large application in different areas as waiting raws and rectifiable systems method , computer and communication systems and the theory of reliability and many other, also it used in modeling the phenomenon that occurred by unfixed way over time (all events that changed by time).

This research deals with some of the basic concepts that are related to the Non - Homogeneous Poisson process , This research carried out two models of the Non - Homogeneous Poisson process which are the power law model , and Musa –okumto ,   to estimate th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
A Comparison between Ericson's Formulae Results and Experimental Data Using New Formulae of Single Particle Level Density
...Show More Authors

The partial level density PLD of pre-equilibrium reactions that are described by Ericson’s formula has been studied using different formulae of single particle level density . The parameter  was used from the equidistant spacing model (ESM) model and the non- equidistant spacing model (non-ESM) and another formula of  are derived from the relation between  and level density parameter . The formulae used to derive  are the Roher formula, Egidy formula, Yukawa formula, and Thomas –Fermi formula. The partial level density results that depend on  from the Thomas-Fermi formula show a good agreement with the experimental data.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Enhancing national security through foreseeing the economic intelligence system in Iraq
...Show More Authors

 

         Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the pos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
Al-kindy College Medical Journal
Application of Alvarado scoring system in the diagnosis of acute appendicitis.
...Show More Authors

Background: Acute appendicitis is the most common abdominal surgical emergency. The diagnosis of this condition is still essentially clinical and there is difficulty in the clinical diagnosis, especially among elderly, children and patients with a typical presentation, so early and accurate diagnosis of acute appendicitis is important to avoid its complications.Objectives: To evaluate the degree of accuracy of Alvarado scoring system in the diagnosis of acute appendicitis.Method: Two hundred patients were admitted to the Alkindy Teaching Hospital from January 2011 to april 2014- presented with symptoms and signs suggestive of acute appendicitis. After examination and investigations all patients were given a score according to Alvarado sc

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Science
Applications of Camera Total Station System (CTSS) in the Construction Surveying
...Show More Authors

AZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012

View Publication
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref