RM Abbas, AA Abdulhameed, AI Salahaldin, International Conference on Geotechnical Engineering, 2010
level of effectiveness of Glutathione - S - Transferees (GST), Glutathione peroxides (GPX),Malondialdehyde (MDA) the product of lipid peroxidation and some trace elements ( zinc,seleinum,iron ,copper ) had been measured in sera of (50) women with breast disease.which had been divided to : Control group (25),The first group (A) benign breast tumors (25),the second group (B) breast cancer (25). The results showed a clear moral high level of Glutathione - S - Transferees (GST), Glutathione peroxidase (GPX) , and Malondialdehyde (MDA) level in breast cancer group while a slight increase were observed in the levels of these enzymes and(MDA) in benign breast group. A significant reduction was evident in the levels of selenium and zinc
... Show MoreAS Muhsen, International Journal of Psychosocial Rehabilitation (1475-7192), 2020 - Cited by 1
As Albizia lebbeck is one of the important species in Iraq and the region, its wood has subjected to investigation through the assessment of differences in its element dimensions and specific gravity under Baghdad conditions. Variations of fiber length, fiber width, cell wall thickness, vessel diameter, and density of wood were examined along the stem and horizontally. Results showed that fiber lengths were within the normal range, but their widths were narrower than common range of hardwoods. There were little increase in fiber length, width, wall thickness as the height position increased. Vessel diameter has been affected contrarily. No significant effects of height on specific gravity could be
... Show MoreThe aim of the research is to demonstrate of the relation and the influence of the components of economic intelligence (strategic alertness, information security policy, impact policy) in achieving of economic growth (creativity, competitiveness, quality improvement). The questionnaire was used as a main tool for selected sample. Answers analyzed by using the statistical program (SPSS) to calculate the arithmetic mean, standard deviation, weight percentage, correlation, F test, and Squared factor (R2).
The research derived its importance from the distinguished role of information systems in the work of industrial companies, and its impact toward achieving economic growth rates in its various activities. T
... Show MoreMany studies and researches related to the audio and visual medium have shed light on the creative process that has taken place through them as well as the aesthetic and artistic creation and have dealt with many fields of knowledge and creativity in this field of art, which managed to study and follow its intellectual and technical tools for creating achievements through this medium, in its forefront come the elements of the cinematic language, which is characterized by possessing multiple features of aesthetic and semantic employment to reach the recipient as it is a tool of the artistic expression that gives the material it deals with aesthetic and intellectual dimensions from various aspects. "The artistic expression cannot be achiev
... Show More<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreProverbs are considered as a major source of ancient events and happenings. Similar to other past events related to life, proverbs have many important and famous values in people's life. This study will shed lights on the use of proverbs as short sentences based on long experiences. The aim of the study is to explicate the roles, and the importance of proverbs in our life and how they are used to convey thoughts to people throughout simple words with denotation. Thus, proverbs explicate the truth and experience of our grandfathers when directed for criticism. Few proverbs were used by writers to criticize, mimic and reprint their personalities. Hence, proverbs will achieve portions of the unique roles of understanding. The model to
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More