Preferred Language
Articles
/
oBfSsI0BVTCNdQwCcBje
Unilateral Contracts – A Comparative Study under the Anglo-American System and the Iraqi Civil Law
...Show More Authors

At a time when the general rules in the different legal systems require the presence of two parties to the contract, one of which is issued the first expression of the will and is called the offer, and the other is issued from the other and is called the acceptance. A special type of contracts emerged in the beginning of the last century called the “unilateral contracts”. The side sparked a major jurisprudential dispute, as well as the issuance of several contradictory judicial rulings on it. Hence, this research came to highlight this special type of contract. Key words: the definition of a unilateral contract, its distinction from other legal situations, and its effects.

View Publication
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Distinguishing Shapes of Breast Cancer Masses in Ultrasound Images by Using Logistic Regression Model
...Show More Authors

The last few years witnessed great and increasing use in the field of medical image analysis. These tools helped the Radiologists and Doctors to consult while making a particular diagnosis. In this study, we used the relationship between statistical measurements, computer vision, and medical images, along with a logistic regression model to extract breast cancer imaging features. These features were used to tell the difference between the shape of a mass (Fibroid vs. Fatty) by looking at the regions of interest (ROI) of the mass. The final fit of the logistic regression model showed that the most important variables that clearly affect breast cancer shape images are Skewness, Kurtosis, Center of mass, and Angle, with an AUCROC of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
Türk Halk Edebiyatında Manzum Atasözleri ve Irak Türkmenleri Arasında Atasözü İçerikli Hoyrat Örnekleri
...Show More Authors

Özet
Sözlü Türk halk edebiyatı ürünleri içinde önemli yere sahip olan türlerden biri de atasözleridir. Atasözleri, nesilden nesile halk ağzında dolaĢan, kimin söylediği bilinmeyen, birtakım gerçekleri kısa ve öz bir Ģekilde ifade eden sözlerdir. Türk atasözleri Orhun Abideleri‟nde ilk kez karĢımıza çıkmakla birlikte, Uygur dönemi yazıtlarında ve özellikle Dîvânü Lûgati‟t Türk‟te geniĢ yer bulmuĢtur. Dilin anlatım ve kullanım imkânlarını geliĢtiren atasözlerine, dünyanın bütün dillerinde rastlanabilir. Bunun için, söyleyiĢte güzel, anlatımda güçlü, kavramda önemli unsurlar içeren kalıplaĢmıĢ sözler halinde bulunurlar. Bu çalıĢmada, Türk halk edebiyatında atas

... Show More
View Publication
Publication Date
Sun Jan 03 2010
Journal Name
Journal Of Educational And Psychological Researches
تقويم مستوى تضمين مناهج المرحلة الأساسية الدنيا (الصفوف 1-3) في الأردن لقيم المواطنة
...Show More Authors

This study aims at assessing the availability of national values in the curriculum of the first three grades in Jordan. The study also aims at the nature of distributing these national values. The sample of the study consists of the curriculum of math, science, Arabic language, Islamic education, and national and civil education in Jordan. To achieve the aims of the study, the researchers used the analyzing approach, and they also depended on the referential statement for the general and                       minor objectives as a tool to analyze and numerate. The results of the study shows that the concentrating on the n

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments
...Show More Authors

Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Apr 01 2010
Journal Name
Journal Of Educational And Psychological Researches
اثر التعلم التعاوني (جيكسو ) في دافعية طالبات قسم رياض الأطفال لتعلم مادة بايكولوجية الإنسان
...Show More Authors

The current study aims at investigating the effect of cooperative learning (Jigsaw) on motivation of female students. Department of kindergarten to learn Human biology. This is of be dove through verification of the hypothesis that there is no significant difference at the 0.05 level between the motivation of experiment of group subjects who study according to (Jigsaw) cooperative learning and that of the control group subjects who study traditionally.
The study is limited to female students al the first year-Department of kindergarten college of Education for women university of Baghdad during the academic year 2007-2008.
An experiment of design of partial control and post-test for two groups is used. The experiment groups consist

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Smart Flow Steering Agent for End-to-End Delay Improvement in Software-Defined Networks
...Show More Authors

To ensure fault tolerance and distributed management, distributed protocols are employed as one of the major architectural concepts underlying the Internet. However, inefficiency, instability and fragility could be potentially overcome with the help of the novel networking architecture called software-defined networking (SDN). The main property of this architecture is the separation of the control and data planes. To reduce congestion and thus improve latency and throughput, there must be homogeneous distribution of the traffic load over the different network paths. This paper presents a smart flow steering agent (SFSA) for data flow routing based on current network conditions. To enhance throughput and minimize latency, the SFSA distrib

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of Educational And Psychological Researches
أثر استعمال الوسائل التعليمية للكتاب المدرسي ورسومات المعلم التوضيحية في تحصيل المعلومات التاريخية واستبقائها
...Show More Authors

The research aims to determine the impact of the use of teaching aids for the textbook and graphics teacher illustrations in the collection of historical information and retention, limited research on a sample of students in grade five numbered (68) primary school students of Benin in Baghdad governorate / Breeding Rusafa First, select the researchers of scientific material for students in research Topics are the first and second chapter of the Book of the Arab-Islamic history, set by the Ministry of Education.

 And promising targets behavioral and according to the content of subject numbered (100) goal and lesson plans exemplary nu

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Impact of Denial-of-Service Attack on Directional Compact Geographic Forwarding Routing Protocol in Wireless Sensor Networks
...Show More Authors

Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Burden of Mothers’ Care for Children with Colostomy at Baghdad Medical City Teaching Hospital
...Show More Authors

Objective(s): To assess the burden of mothers` care for child with colostomy and find out relationships between child and mother socio-demographic data with mothers` burden. Methodology: a descriptive study was conducted from 1 August 2013 to 1 September 2014. The sample consisted of 100 children and their mothers at Baghdad Teaching hospital in Baghdad city. A questionnaire was prepared based on the previous literature review, meeting mothers of children with colostomy, and the Zarit Burden Interview scale. Data has collected through the application of questionnaire and interview techniques. Results: T

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
الاهمية الاقتصادية للموانىء الحرة مع الاشارة الى المنطقة الاقتصادية الحرة المقترحة في ميناء الفاو
...Show More Authors

الاهمية الاقتصادية للموانىء الحرة مع الاشارة الى المنطقة الاقتصادية الحرة المقترحة في ميناء الفاو

View Publication Preview PDF
Crossref