Preferred Language
Articles
/
0RdI_I0BVTCNdQwCRCuZ
Formulating a strategy for the Northern Oil Company(Case Study)
...Show More Authors

يهدف البحث الى تقديم استراتيجية مقترحة لشركة نفط الشمال ، وأخذت الاستراتيجية المقترحة بنظر الاعتبار الظروف البيئية المحيطة واعتمدت في صياغتها على اسس وخطوات علمية تتسم بالشمولية والواقعية ، اذ انها غطت الانشطة الرئيسية في الشركة (نشاط الانتاج والاستكشاف , نشاط التكرير والتصفية , التصدير ونقل النفط , نشاط البحث والتطوير , النشاط المالي , تقنية المعلومات , الموارد البشرية ) وقد اعتمد نموذج (David) في التحليل البيئي للعوامل التي تم تشخيصها وفق اساس مدروس وبمشاركة خبراء الشركة والادارات وبعد اجراء المسح الكامل لاستكشاف العوامل الداخلية والخارجية وبناء مصفوفة swot عبر تحديد وزن واهمية لكل عامل . كما اعتمد نموذج (Bryson) في تحديد القضايا الاستراتيجية وهو نموذج ملائم للمؤسسات الحكومية الهادفة للربح ، وبعد تحليل العوامل الداخلية والخارجية (EFE,IFE) ظهر ان الاستراتيجية الاكثر ملائمة للشركة هي استراتيجية النمو والتوسع ( القوة – الفرص S O )، وهذه الاستراتيجية توفر فرصة جيدة لتحقيق اهداف الشركة للسنوات الخمس القادمة ، وعزز من عملية صياغة القضايا الاستراتيجية الحساسة والتي تدخل في صلب التوجه نحو تطوير عمل الشركة بانها قد اشتملت على القضايا الاستراتيجية والمعوقات والافق الزمني والبرامج والاجراءات وتحديد جهة التنفيذ والمتابعة مع معايير التقييم . وقد اوصى الباحثان بضرورة اعتماد هذه الوثيقة الاستراتيجية المقترحة لاسيما انها تحاكي واقع الشركة وتستجيب لمتطلبات دورها في دعم الاقتصاد الوطني

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Mathematical Modelling Of Engineering Problems
Investigation of Energy Efficient Clustering Algorithms in WSNs: A Review
...Show More Authors

In recent years, Wireless Sensor Networks (WSNs) are attracting more attention in many fields as they are extensively used in a wide range of applications, such as environment monitoring, the Internet of Things, industrial operation control, electric distribution, and the oil industry. One of the major concerns in these networks is the limited energy sources. Clustering and routing algorithms represent one of the critical issues that directly contribute to power consumption in WSNs. Therefore, optimization techniques and routing protocols for such networks have to be studied and developed. This paper focuses on the most recent studies and algorithms that handle energy-efficiency clustering and routing in WSNs. In addition, the prime

... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Geotechnical Engineering And Sustainable Construction
Evaluation of Live Load Distribution Factors of a Highway Bridge
...Show More Authors

Scopus (1)
Scopus Crossref
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of Educational And Psychological Researches
Educational Curricula of preeminent and Talent:Enrichment Curriculum as a Model
...Show More Authors

This research aimed at recognizing the properties of curricula that fitted to preeminent and talent students. Many types of these curricula were exposed, enrichment curriculum was explained as one of alternatives of available curricula.
The research used the analytical methodology for local and international literature in the field of preeminent and talent education to meet the properties of curricula that fitted to this special group of students. Many results was obtained as:
• This type of school enrichment curriculum consists of three levels( general discovery activities, individual and groups training activities, and individual or groups real problems).
• Investigation the effectively both sides of brain: right and left,

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Anal Fissure: Is it becoming a medical disorder? Review Article
...Show More Authors

An anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored. A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure. Pharmacological

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 20 2014
Journal Name
Jurnal Teknologi
A Review of Snake Models in Medical MR Image Segmentation
...Show More Authors

Developing an efficient algorithm for automated Magnetic Resonance Imaging (MRI) segmentation to characterize tumor abnormalities in an accurate and reproducible manner is ever demanding. This paper presents an overview of the recent development and challenges of the energy minimizing active contour segmentation model called snake for the MRI. This model is successfully used in contour detection for object recognition, computer vision and graphics as well as biomedical image processing including X-ray, MRI and Ultrasound images. Snakes being deformable well-defined curves in the image domain can move under the influence of internal forces and external forces are subsequently derived from the image data. We underscore a critical appraisal

... Show More
Scopus (10)
Scopus
Publication Date
Mon Dec 01 2025
Journal Name
Journal Of Kufa For Chemical Sciences
Miscellaneous Azo Dyes: A Review on Recent Advancements and Applications
...Show More Authors

The dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on leather

... Show More
Preview PDF
Crossref
Publication Date
Mon Dec 01 2025
Journal Name
Journal Of Kufa For Chemical Sciences
Miscellaneous Azo Dyes: A Review on Recent Advancements and Applications
...Show More Authors

The dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jul 07 2021
Journal Name
International Journal Of Applied Pharmaceutics
APPLICATION OF 3D PRINTING IN INNOVATED DRUG DELIVERY: A REVIEW
...Show More Authors

Increasing requests for modified and personalized pharmaceutics and medical materials makes the implementation of additive manufacturing increased rapidly in recent years. 3D printing has been involved numerous advantages in case of reduction in waste, flexibility in the design, and minimizing the high cost of intended products for bulk production of. Several of 3D printing technologies have been developed to fabricate novel solid dosage forms, including selective laser sintering, binder deposition, stereolithography, inkjet printing, extrusion-based printing, and fused deposition modeling. The selection of 3D printing techniques depends on their compatibility with the printed drug products. This review intent to provide a perspecti

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref