Preferred Language
Articles
/
jcois-495
Ruling on questioning children by the security authorities: (Comparative Study between Sharia and Law)
...Show More Authors

Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 17 2014
Journal Name
Microbial Ecology
Investigating the Link Between Imipenem Resistance and Biofilm Formation by Pseudomonas aeruginosa
...Show More Authors

Pseudomonas aeruginosa, a ubiquitous environmental organism, is a difficult-to-treat opportunistic pathogen due to its broad-spectrum antibiotic resistance and its ability to form biofilms. In this study, we investigate the link between resistance to a clinically important antibiotic, imipenem, and biofilm formation. First, we observed that the laboratory strain P. aeruginosa PAO1 carrying a mutation in the oprD gene, which confers resistance to imipenem, showed a modest reduction in biofilm formation.We also observed an inverse relationship between imipenem resistance and biofilm formation for imipenem-resistant strains selected in vitro, as well as for clinical isolates.We identified two clinical isolates of P. aeruginosa from the sputum

... Show More
View Publication
Scopus (30)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Prioritized Text Detergent: Comparing Two Judgment Scales of Analytic Hierarchy Process on Prioritizing Pre-Processing Techniques on Social Media Sentiment Analysis
...Show More Authors

Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri May 16 2025
Journal Name
Journal Of Forensic Medicine And Toxicology
Exploring the Effect of Disruptive Behavioral Disorders on Quality of Learning Among School Children: Across-sectional Study
...Show More Authors

Background: disruptive behavioral disorders among primary school children is oone of the most popular, which has  negative social, psychological, educational, and physical repercussions on children and families. Objective: This study sought to determine effect disruptive behavioral disorders quality of learning among school chil dren. Methods: A descriptive cross-sectional design study was conducted at Baquba primary schools in Diyala Governorate,  and the study period was extended from October 6th, 2024, to January 15th, 2025. A nonprobability purposive sample was  used to include 275 teachers working at selected Baquba primary schools, Iraq. Data were collected using a self-admin istered questionnaire, two components of the st

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Relatives marriage and its genetic effect on children
...Show More Authors

Marriage is a characteristic of the human race, as it is one of the oldest organization, asoldas human beign marrige is a legitimale relationsbip between male and female in the name of Allah "o mankind !Be dutiful to your lord, Who created you from a single person (Adam), and from him (Adam) He created his Wife (Eve), and from them both He created mang men and women
Marriage is a requirement of human life to ensure tle continuity and survival of the human species and established it in a legal, social and legitimate frame,according to certain criteria and conditions so that the individual earns psychological and social comfort in the name of Allah and Allah has made for you Azwaj ( mates or wives), sons and grand sons, and has bestowed

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
STUDY THE PHYSICAL AND CHEMICAL PROPERTIES AND DETERMINATION THE CYTOTOXICITY OF KOJIC ACID PRODUCED FROM THE LOCAL ISOLATE ASPERGILLUS FLAVUS WJF81 AND THEIR EFFECTS ON CONSUMER HEALTH.: STUDY THE PHYSICAL AND CHEMICAL PROPERTIES AND DETERMINATION THE CYTOTOXICITY OF KOJIC ACID PRODUCED FROM THE LOCAL ISOLATE ASPERGILLUS FLAVUS WJF81 AND THEIR EFFECTS ON CONSUMER HEALTH.
...Show More Authors

Steps were taken to obtain the Kojic acid crystals from local fungal isolation A. flavus WJF81 by separating the fermentation products from the fungus mycelium from the production plant at the centrifuge at a speed of 5000 cycles for 10 minutes. The extraction was followed by ethyl acetate then supernatant concentrate by using rotary evaporator, and dried with heat oven 37ºC. Long, yellowish, pristine acid crystals were obtained that examined the optical microscope with a magnification force of 10x and 40x. The melting point of kojic acid was determined between 152.9-153.5 °C Results of the diagnosis of Kojic acid by applying High pressure liquid chromatography HPLC technique showed that the acid was at one peak, which was close to the

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Semantic differences between the explicit source The Mimi source in the Holy Quran
...Show More Authors

The main purpose of the research is to study the significance of the event in the explicit source and its significance in the Mimi source and to explain the difference between them in the Holy Quran, especially since most linguists were not interested in what the Mime source indicates in the text, but focused on its form and form, as they defined it as the name Linguists and grammarians did not mention a difference in meaning between the explicit source and the Mimi source, and they interpret the second in the first sense, which led me to choose this topic, to know the significance of each source through Appeal to the maqam and occasion in a challenge D The exact meaning.

View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Asthma and Inhaled Corticosteroid Effect on the Dental Arch Morphology in Children
...Show More Authors

Background: asthma has an influence on craniofacial development. Recently evidences show that there is an association between oral health problems and chronic lung disease. The present study was designed to estimate the changes in arch dimension measurements among asthmatic children aged 12 years old who were collected from AL- Zahra Center Advisory for Allergy and Asthma and compare them with the non-asthmatic children of the same age and gender. Material and Methods: Fifty children (25 asthmatic and 25 non- asthmatic children) were included for the odontometric measurement. For both upper and lower study models, photographs were taken using special photographic apparatus for each child, and the statistical analysis were done by using SPSS

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 21 2018
Journal Name
The American Society For Virology's 38th Annual Meeting Will Be Held At The University Of Minnesota In Minneapolis, Mn
Comparative Study of different Predators’ effect on Chlorovirus Amplification Foraging on Zoochlorellae-Containing Paramecia?
...Show More Authors

Preview PDF