Preferred Language
Articles
/
bsj-646
Cholera disease in iraq and the invetigation of some virulence of vibrio locally isolated from diarrhea case
...Show More Authors

A survey statistician for cholera in Iraq for 1980 and until 2003 show that cholera is endemic in Iraq and that the highest number of casualties recorded in the years 1998-1999 and increasing spread of the disease during the wars in hot climates, wet a study bacteriological used where circles selective and tests Alkouhaoah examinations serological system

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
Factors Affecting Attaching Ruling to Its Cause (Illah) or to Its Reason (Hikmah): A Study in Usul Al Fiqh
...Show More Authors

 

There is a theoretical controversy in the books of Usul al-Fiqh, in the past and the present, about whether the ruling should be attached to its reason (al-Hikmah), or its apparent and stable cause (al-Illah). Looking at the practical cases of the jurists, we found them sometimes attaching rulings to its reason, and sometimes to its cause, so there is a need to know the factors that affect their choices. By extrapolation, the researcher reached at nine factors that affect referring the ruling to its cause or to its reason in jurisprudential cases.

View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Cybersecurity And Information Management
A New Automated System Approach to Detect Digital Forensics using Natural Language Processing to Recommend Jobs and Courses
...Show More Authors

A resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Melasma, Melasma-Like Lichen Planus Actinicus, and Butterfly Lichen Planus Actinicus Build up One Spectrum (Clinico-Histopathological Study)
...Show More Authors

KE Sharquie, AA Noaimi, MA Al-Shukri, Journal of Cosmetics, Dermatological Sciences and Applications, 2015 - Cited by 3

View Publication
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Mosaic art as a cultural decorative aspect and contemporary mosaic re-employment: محمد طلال عبد آل عبد الله
...Show More Authors
  • Islamic art is applied art that searches for everything that is useful and beneficial and Both are properties of Islamic art. Islamic art has many well-established elements and styles and pictures that distinguish it from the rest of the arts among those elements and methods that were used in the architectural cladding artwork Or mosaic murals and mosaic was known in its first form in Babylon in a primitive style similar to it, but the Muslim artist in the era of the Caliphs made the art of mosaic In mosques and palaces.
    Chapter one: This chapter is concerned with introducing the art of mosaic historically and focusing on it.
    Chapter Two: This chapter deals with contemporary Islamic mosaics, especially in Mecca
... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Network And Computer Applications
L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks
...Show More Authors

View Publication
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Nov 15 2021
Journal Name
Aip Conference Proceedings
Oil skimming followed by coagulation/flocculation processes for oilfield produced water treatment and zero liquid discharge system application
...Show More Authors

The study focused on the treatment of real oilfield produced water from the East Baghdad field affiliated to the Midland Oil Company (Iraq) using an oil skimming process followed by a coagulation/flocculation process for zero liquid discharge system applications. Belt type oil skimmer was utilized for evaluating the process efficiency with various operating conditions such as temperature (17-40 °C) and time (0.5-2.5 hr.). Polyaluminum chloride (PAC) coagulant and polyacrylamide (PAM) flocculant was used to investigate the performance of the coagulation/flocculation process with PAC dosage (5-90 ppm) and pH (5-10) as operating conditions. In the skimming process, the oil content, COD, turbidity, and TSS decreased with an increase in tempera

... Show More
View Publication
Publication Date
Thu Mar 13 2025
Journal Name
Journal Of Lifestyle And Sdgs Review
Advancing SDG: Towards Effective Sustainability Reporting for Green Universities Via XBRL and Its Impact on Green Auditing Quality
...Show More Authors

Objective: This study aims to examine how implementing Extensible Business Reporting Language (XBRL) enhances the efficiency and quality of environmental audits and sustainability reporting in eco-friendly universities. Aligned with Sustainable Development Goal 12 (Responsible Consumption and Production), the study emphasizes promoting transparency and precision in sustainability reporting to encourage responsible management of resources within academic institutions.   Theoretical Framework: The importance of our study is evident in the importance of accurate and transparent reports in the development of environmental performance with theories of sustainable reporting and environmental auditing. One of the most important digital

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue May 01 2012
Journal Name
Engineering Analysis With Boundary Elements
Radial integration boundary integral and integro-differential equation methods for two-dimensional heat conduction problems with variable coefficients
...Show More Authors

View Publication
Crossref (35)
Crossref
Publication Date
Sat Nov 05 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Image Compression Based on Cubic Bezier Interpolation, Wavelet Transform, Polynomial Approximation, Quadtree Coding and High Order Shift Encoding
...Show More Authors

In this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF