In the last few years, following the relative stability of the political, economic, and security environments, Iraq has embarked on a transformation towards an ambitious program of automation across various sectors. However, this automation program faces numerous challenges, including significant investments in technology and training, addressing social impacts, and combating widespread illiteracy
A gracious invitation was extended to us on 9/11/2002 AD, by the University of Tikrit / the Preparatory Committee, for a symposium (Sheikh Daoud Al-Tikriti, and his Scientific Effects), to participate in it.
The symposium was scheduled to be held on the 25th and 26th of March 2003 AD, but God Almighty decreed that our country be occupied, so the Preparatory Committee set another date for the symposium on 10/21/2003 AD.
It was not possible for the symposium to be held until 25-26/4/2004 AD, and many researchers attended, who were assigned to investigate some manuscripts of Sheikh Dawood (may God have mercy on him) or to write about his personal and scientific biography.
And God (Glory be to Him) did not enable us to attend, becau
The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreBackground: The isthmus is a difficult area in the root canal complex to manage. The research aimed to evaluate the efficiency of three different obturation techniques (lateral condensation, EandQ (thermoplasticized gutta percha system) and Soft Core (thermoplasticized core carrier gutta percha system)) to obturate the isthmus area of roots prepared by two different instrumentation techniques (rotary ProTaper universal and ProTaper Next systems). Material and method: Sixty freshly extracted teeth were randomly divided into two main groups (A and B) of 30 teeth each. Group A was prepared by rotary ProTaper Universal whereas group B was prepared by ProTaper Next system. Each main group was then randomly subdivided into three subgroups of 10 t
... Show MoreTitanium alloy surface properties have an essential role in the interaction of dental implants with bone, and alteration of the surface of the implant could improve osseointegration. This study was designed to investigate the effect of different heat treatment temperatures on titanium alloy surface properties for dental implants. The effect of different temperatures of heat treatment (750°C, 850°C, 950°C and 1050°C) were investigated on the surface topography, surface chemistry, titanium oxide layer thickness, blood contact angle, & blood drop diameter of titanium alloy. The disks were prepared from titanium alloy (Ti-6Al-4V) and the samples were divided into five groups depending on the different temperatures of heat treatment. The hea
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreIn this paper, compared eight methods for generating the initial value and the impact of these methods to estimate the parameter of a autoregressive model, as was the use of three of the most popular methods to estimate the model and the most commonly used by researchers MLL method, Barg method and the least squares method and that using the method of simulation model first order autoregressive through the design of a number of simulation experiments and the different sizes of the samples.
Post Modern Persian poetry that is rich with visions and creations has slowly but firmly regained its statues in modern Persian literature and poetry. Ali Baba Chahi is considered one of Iran’s most prominent postmodern and post-Nimaie writer and poet.
The present paper discusses the general style characteristics as well as the distinctive stylistic creations of Ali Baba Chahi as presented in his collected poems In Caves full of Daffodils.
In conclusion, the study crystallizes some of the stylistic characteristics of Ali Baba Chahi as a leading figure in postmodern poetry. The study, also, provides a comprehensive critical analysis of the collection of
... Show MoreDarcy-Weisbach (D-W) is a typical resistance equation in pressured flow; however, some academics and engineers prefer Hazen-Williams (H-W) for assessing water distribution networks. The main difference is that the (D-W) friction factor changes with the Reynolds number, while the (H-W) coefficient is a constant value for a certain material. This study uses WaterGEMS CONNECT Edition update 1 to find an empirical relation between the (H-W) and (H-W) equations for two 400 mm and 500 mm pipe systems. The hydraulic model was done, and two scenarios were applied by changing the (H-W) coefficient to show the difference in results of head loss. The results showed a strong relationship between both equations with correlation coefficients of 0.999,
... Show More