The aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.
The accumulation of sediment in reservoirs poses a major challenge that impacts the storage capacity, quality of water, and efficiency of hydroelectric power generation systems. Geospatial methods, including Geographic Information Systems (GIS) and Remote Sensing (RS), were used to assess Dukan Reservoir sediment quantities. Satellite and reservoir water level data from 2010 to 2022 were used for sedimentation assessment. The satellite data was used to analyze the water spread area, employing the Normalized Difference Water Index (NDWI) and Modified Normalized Difference Water Index (MNDWI) to enhance the water surface in the satellite imagery of Dukan Reservoir. The cone formula was employed to calculate the live storag
... Show MoreThe current research dealt with the issue of organizational skillfulness as an entry point to reach strategic agility. The study has been tested in Iraq's mobile operators - Asia Cell, Zain Iraq and Cork Telecom. The study was applied to a sample of (93) managers distributed at various levels of management (board members, general managers, commissioners, department managers, people managers, unit managers, office managers). The survey used the questionnaire as a key tool for collecting data and information as well as personal interviews. It has sought to test a number of hypotheses related to correlation and influence relationships between the variables of the study, in order to answer the questions related to the problem of stud
... Show MoreThis study illustrates in vitro effect of cold atmospheric plasma (CAP) on the treatment of Leishmania. In addition, the study evaluated the effect of drug treatment (pentostam) and the combination treatment of pentostan and CAP at different doses and incubation time 24 h in order to assess the most effective treatment. The duration of the cold plasma doses was 1 min, 2 min and 3 min, while the pentostam doses were 2.5 µg/ml and 5 µg/ml. The combinations therapies included combining the three cold plasma doses with the pentostam doses to test 6 combinations of treated in vitro. The maximum growth inhibition was given by combination treated 46% and 44% for donovani and tropica leishamnia respectively; these results give an indi
... Show MoreAchieving an accurate and optimal rate of penetration (ROP) is critical for a cost-effective and safe drilling operation. While different techniques have been used to achieve this goal, each approach has limitations, prompting researchers to seek solutions. This study’s objective is to conduct the strategy of combining the Bourgoyne and Young (BYM) ROP equations with Bagging Tree regression in a southern Iraqi field. Although BYM equations are commonly used and widespread to estimate drilling rates, they need more specific drilling parameters to capture different ROP complexities. The Bagging Tree algorithm, a random forest variant, addresses these limitations by blending domain kno
The neutrophil/ lymphocyte ratio (NLR) and platelet/lymphocyte ratio (PLR) have the potential to be inflammatory markers that reflect the activity of many inflammatory diseases. The aim of this study was to evaluate the NLR and PLR as potential markers of disease activity in patients with ankylosing spondylitis.
The study involved 132 patients with ankylosing spondylitis and 81 healthy controls matched in terms of age and gender. Their sociodemographic data, disease activity scores using the Bath Ankylosing
Abstract: The aim of the research identify the effect of using the five-finger strategy in learning a movement chain on the balance beam apparatus for students in the third stage in the College of Physical Education and Sports Science, as well as to identify which groups (experimental and controlling) are better in learning the kinematic chain on the balance beam device, has been used The experimental approach is to design the experimental and control groups with pre-and post-test. The research sample was represented by third-graders, as the third division (j) was chosen by lot to represent the experimental group, and a division Third (i) to represent the control group, after which (10) students from each division were tested by lot to repr
... Show MoreThe research deals with the concept of rationalization of consumption, which is legitimately legitimized, by indicating the permissibility of consumption and its limits in Islam, the legitimate aspects of spending and its controls, and the concept of development in the Islamic economy. The researcher followed the descriptive method by presenting the legal texts and jurisprudential opinions and linking them to contemporary economic problems.The research has reached several conclusions, the most important of which is that the goal of Islam in relation to consumption is to inform the Muslim of the amount of economic maturity, and the truth of alms is good in money and religion. It is necessary for achieving maturity that both means
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreObjective: Dental caries is a chronic infectious disease that is prevalent worldwide in all age groups. Numerous attempts have been made to develop conservative approaches to halt caries progression and restore enamel defects. This study aimed to investigate the effect of applying grape seed extract and chicken eggshell extract on the microhardness of demineralized enamel in permanent teeth. Methods: Forty-eight sound upper first premolars were used. Following demineralization with the demineralizing solution for 96 hours, they were distributed into four groups consistent with the treatment agent used: group A was treated with casein phosphopeptide amorphous calcium phosphate (as a control group), group B was treated with grape se
... Show More