Preferred Language
Articles
/
0RdI_I0BVTCNdQwCRCuZ
Formulating a strategy for the Northern Oil Company(Case Study)
...Show More Authors

يهدف البحث الى تقديم استراتيجية مقترحة لشركة نفط الشمال ، وأخذت الاستراتيجية المقترحة بنظر الاعتبار الظروف البيئية المحيطة واعتمدت في صياغتها على اسس وخطوات علمية تتسم بالشمولية والواقعية ، اذ انها غطت الانشطة الرئيسية في الشركة (نشاط الانتاج والاستكشاف , نشاط التكرير والتصفية , التصدير ونقل النفط , نشاط البحث والتطوير , النشاط المالي , تقنية المعلومات , الموارد البشرية ) وقد اعتمد نموذج (David) في التحليل البيئي للعوامل التي تم تشخيصها وفق اساس مدروس وبمشاركة خبراء الشركة والادارات وبعد اجراء المسح الكامل لاستكشاف العوامل الداخلية والخارجية وبناء مصفوفة swot عبر تحديد وزن واهمية لكل عامل . كما اعتمد نموذج (Bryson) في تحديد القضايا الاستراتيجية وهو نموذج ملائم للمؤسسات الحكومية الهادفة للربح ، وبعد تحليل العوامل الداخلية والخارجية (EFE,IFE) ظهر ان الاستراتيجية الاكثر ملائمة للشركة هي استراتيجية النمو والتوسع ( القوة – الفرص S O )، وهذه الاستراتيجية توفر فرصة جيدة لتحقيق اهداف الشركة للسنوات الخمس القادمة ، وعزز من عملية صياغة القضايا الاستراتيجية الحساسة والتي تدخل في صلب التوجه نحو تطوير عمل الشركة بانها قد اشتملت على القضايا الاستراتيجية والمعوقات والافق الزمني والبرامج والاجراءات وتحديد جهة التنفيذ والمتابعة مع معايير التقييم . وقد اوصى الباحثان بضرورة اعتماد هذه الوثيقة الاستراتيجية المقترحة لاسيما انها تحاكي واقع الشركة وتستجيب لمتطلبات دورها في دعم الاقتصاد الوطني

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Siam Journal On Control And Optimization
A Duality Approach for Solving Control-Constrained Linear-Quadratic Optimal Control Problems
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
A novel improvement of skew tent map for generating Pseudo random numbers
...Show More Authors

An encryption system needs unpredictability and randomness property to maintain information security during transmission and storage. Although chaotic maps have this property, they have limitations such as low Lyapunov exponents, low sensitivity and limited chaotic regions. The paper presents a new improved skewed tent map to address these problems. The improved skew tent map (ISTM) increases the sensitivity to initial conditions and control parameters. It has uniform distribution of output sequences. The programs for ISTM chaotic behavior were implemented in MATLAB R2023b. The novel ISTM produces a binary sequence, with high degree of complexity and good randomness properties. The performance of the ISTM generator shows effective s

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Expert Systems With Applications
A long short-term recurrent spatial-temporal fusion for myoelectric pattern recognition
...Show More Authors

View Publication
Scopus (24)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Traitement Du Signal
A Comprehensive Review on Machine Learning Approaches for Enhancing Human Speech Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Simple Method for Studying Crushability and Grindability of Rocks and Minerals
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
A spherical fuzzy AHP model for contractor assessment during project life cycle
...Show More Authors
Abstract<p>Measurement of construction performance is essential to a clear image of the present situation. This monitoring by the management team is necessary to identify locations where performance is exceptionally excellent or poor and to identify the primary reasons so that the lessons gained may be exported to the firm and its progress strengthened. This research attempts to construct an integrated mathematical model utilizing one of the recent methodologies for dealing with the fuzzy representation of experts’ knowledge and judgment considering hesitancy called spherical fuzzy analytic hierarchy process (SFAHP) method to assess the contractor’s performance per the project performance pa</p> ... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Islamic feminism is a discussion of paths for establishing an Islamic epistemology
...Show More Authors

If feminist philosophy in the context of feminist research focuses on how to produce an alternative knowledge and culture for women and forming anew awareness of their roles in the face of prevailing misconceptions then the topic of Islamic feminism is presented as a philosophical topic in the field of human knowledge to discuss how to produce an alternative knowledge of traditional knowledge prevailing in patriarchal societies to restore the balance of power and authority in the relationship between the sexes to create an effective feminist role in advocating for and defending womenś issues to achieve this Islamic feminism sought to establish an Islamic epistemology .

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Iop
Water cut comparison for a really similar gridding system (line drive pattern)
...Show More Authors

Scopus