Preferred Language
Articles
/
_xjRLJUBVTCNdQwC9Smw
Cognitive-communicative approach in the system of teaching Russian language for foreign students (in the condition of no language environment)
...Show More Authors

Crossref
View Publication
Publication Date
Wed Jan 28 2026
Journal Name
Wasit Journal Of Sports Sciences
The impact of the Needham model on learning the skills of dribbling and handling in football for students
...Show More Authors

View Publication
Publication Date
Thu Oct 06 2022
Journal Name
Advances In Systems Science And Applications
Stability and Bifurcation of a Delay Cancer Model in the Polluted Environment
...Show More Authors

It is well known that the spread of cancer or tumor growth increases in polluted environments. In this paper, the dynamic behavior of the cancer model in the polluted environment is studied taking into consideration the delay in clearance of the environment from their contamination. The set of differential equations that simulates this epidemic model is formulated. The existence, uniqueness, and the bound of the solution are discussed. The local and global stability conditions of disease-free and endemic equilibrium points are investigated. The occurrence of the Hopf bifurcation around the endemic equilibrium point is proved. The stability and direction of the periodic dynamics are studied. Finally, the paper is ended with a numerical simul

... Show More
View Publication
Scopus (2)
Scopus
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Communicative Values of Visual Suggestion in TV advertising: علاء جاسب عجيل-سارة سالم مهدي
...Show More Authors

This research (communicative values of the visual suggestion in TV advertising) presents a precise description for the process of conveying the communicative message through employing the visual suggestion in TV advertisements. This research consists of four chapters. The first chapter includes the research problem which is summarized by the following question: what are the communicative values accomplished in Tv advertisement which produce visual suggestions that raise strangeness and tension in the advertisement?
The research importance lies in benefiting the researchers and scholars in the field of TV advertisement direction and the visual suggestion is one the main ways for building the advertisement. It also benefits the relevan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 28 2026
Journal Name
Nasaq
Characteristics of Zoomorphic Metaphor in Russian Political Discourse
...Show More Authors

View Publication
Publication Date
Tue Jan 17 2023
Journal Name
Mesopotamian Journal Of Cyber Security
The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment
...Show More Authors

The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use

... Show More
View Publication
Crossref (30)
Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Design of Expert System for Managing the System of AthTharthar Lake
...Show More Authors

The operation and management of water resources projects have direct and significant effects on the optimum use of water. Artificial intelligence techniques are a new tool used to help in making optimized decisions, based on knowledge bases in the planning, implementation, operation and management of projects as well as controlling flowing water quantities to prevent flooding and storage of excess water and use it during drought.

 In this research, an Expert System was designed for operating and managing the system of AthTharthar Lake (ESSTAR). It was applied for all expected conditions of flow, including the cases of   drought, normal flow, and during floods. Moreover, the cases of hypothetical op

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Law /al-nahrain University
The Content of the Contract – A Study in Light of French Legislative Decree No. 131-2016 Issued on 10 February 2016
...Show More Authors

Of the new concepts introduced by the decree of the amendment of the French Civil Code No. 131-2016 issued on 10 February 2016, which raised a debate in jurisprudence both at the level of French jurisprudence or the Arab, the concept of (the content of the contract), which seems to have emerged from the appearance of new legal articles ( 1162-1171) is the cornerstone of the contract and the contract in the contract, the two pillars which, over the course of 200 years and a half, have been one of the main pillars of the codification of Napoleon. Is that the decree of amendment has already abandoned these two pillars, or most of what he did is a change in terminology while preserving the content of these two pillars implicitly, this is what w

... Show More
View Publication
Publication Date
Wed Jan 23 2019
Journal Name
Al–bahith Al–a'alami
The Persuasive Methods of ISIS in Recruiting Individuals (Scientific Approach)
...Show More Authors

The rapid success and the field dilation of Daish organization in both Iraq and Syria make academic institutes and research centers to pay attention to its propaganda means to gain its public opinion, and to further investigation about new methods employed by this organization to disseminate its messages to the public, particularly young people in large areas of the world. This organization uses traditional propaganda techniques on psychological war and its levels, social network sites and platforms that are distributed online. This study seeks to expose more persuasive methods used by the organization to gain multiple classes of society and to disseminate its extremist ideological thoughts. It also studies the psychological operation an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Gingival condition, enamel anomalies and traumatic dental injuries among 14-15 years intermediate school male students in Al-Khalis City/Iraq
...Show More Authors

Background: One of the most common and prevalent oral diseases among adolescents is periodontal disease particularly gingivitis, however enamel anomalies and dental trauma could occur. Aims of the study: This study was conducted among 14-15 years intermediate school male students in urban area of Al-Khalis city to assess the oral hygiene (dental plaque) and to estimate the prevalence and severity of gingivitis, enamel anomalies, as well as traumatic dental injuries, furthermore to show the significant difference between these two ages concerning these oral problems. Materials and methods: In this study the total sample consisted of 735 students (397 aged 15 years and 338 aged 14 years ). In present study dental plaque was recorded accord

... Show More
View Publication
Scopus (2)
Scopus Crossref