Preferred Language
Articles
/
TRb2uYsBVTCNdQwC8di4
First report of phytoplasma detection on sand olive, cowpea and alfalfa in Iraq
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 22 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF ENTEROTOXINS OF Staphylococcus aureus IN MILK AND LOCOLLY SOFT CHEESES IN BAGHDAD CITY: DETECTION OF ENTEROTOXINS OF Staphylococcus aureus IN MILK AND LOCOLLY SOFT CHEESES IN BAGHDAD CITY
...Show More Authors

This study aimed to detect of contamination of milk and local soft cheese with Staphylococcus aureus and their enterotoxins with attempt to detect the enterotoxin genes in some isolates of this bacteria. A total of 120 samples, 76 of raw milk and 44 of soft cheese were collected from different markets of Baghdad city. Enterotoxins in these samples were detected by VIDAS Set 2 system and it was found that enterotoxin A is present in a rate of 44.74% in milk samples and in a rate 54.50% in cheese samples. While other enterotoxins B, C, D, E were not found in any rate in any samples.
Through the study 60 isolates obtained from milk and cheeses were identified as Staphylococcus aureus by cultural, morphological and biochemical test by u

... Show More
View Publication Preview PDF
Publication Date
Tue May 05 2015
Journal Name
Scientific Education
The effect of the KWLH strategy on the reading comprehension of first-year intermediate female students
...Show More Authors

Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
مجلة العلوم التربوية والنفسية
The effect of the self-scheduling strategy on the chemistry achievement of first intermediate female students
...Show More Authors

Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The quality of the auditor's report in the local environment in compliance with the requirements of the ISA 701 standard
...Show More Authors

The research aims to demonstrate the quality of the auditor’s report by analyzing a number of models represented by the auditor’s report based on the Iraqi audit evidence and the auditor’s report in light of the application of international auditing standards for the report and the auditor’s report in light of the application of the International Auditing Standard 701, in addition to explaining the impact of applying the International Auditing Standard 701. International Auditing 701 in enhancing the quality of the auditor's report, and in order to reach these goals, a comparison was made on international experiences before and after the application of the standard in addition to the results of the questionnaire distribut

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Using the Generative Learning Model on the Achievement of First-Grade Intermediate Students of Chemical Concepts in Science
...Show More Authors

Abstract

The current research aims to identify the effect of using a model of generative learning in the achievement of first-middle students of chemical concepts in science. The researcher adopted the null hypothesis, which is there is no statistically significant difference at the level (0.05) between the mean scores of the experimental group who study using the generative learning model and the average scores of the control group who study using the traditional method in the chemical concepts achievement test. The research consisted of (200) students of the first intermediate at Al-Farqadin Intermediate School for Boys affiliated with the Directorate of General Education in Baghdad Governorate / Al-Karkh 3 wit

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Al-kindy College Medical Journal
Thyroid Hemiagenesis with Ipsilateral Parathyroid Adenoma; Case report with Review of the Literature
...Show More Authors

Thyroid hemiagenesis (THA) is a rare congenital anomaly in which one lobe of thyroid gland fails to develop during embryological stage. Agenesis may be unilateral, total or isthmic. Left thyroid lobe is more commonly involved than right lobe in hemiagenesis. Agenesis of the isthmus was seen in 50% of cases. Left sided hemiagenesis is more common than right sided hemiagenesis with a Left to right ratio of 4:1. Clinically patients can be euthyroid, hypothyroid or hyperthyroid. Often it is diagnosed as an incidental finding during ultrasonography (USG) study of neck, which can easily diagnose this condition.

Actual incidence of THA is unknown; most cases are diagnosed in patients admitted for thyroid scan or thyroid surgery because

... Show More
View Publication Preview PDF
Crossref