Preferred Language
Articles
/
5RZ3mYcBVTCNdQwCc1dl
Generalization of Rough Set Theory Using a Finite Number of a Finite d. g.'s
...Show More Authors

This paper is concerned with introducing and studying the new approximation operators based on a finite family of d. g. 'swhich are the core concept in this paper. In addition, we study generalization of some Pawlak's concepts and we offer generalize the definition of accuracy measure of approximations by using a finite family of d. g. 's.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
A study of Land Zoning in the base of Traffic Noise Pollution Levels using ArcGIS: Kirkuk City as a Case Study
...Show More Authors

This study is an approach to assign the land area of  Kirkuk city [ a city located in the northern of Iraq, 236 kilometers north of  Baghdad  and 83 kilometers  south of  Erbil [ Climatic atlas of  Iraq, 1941-1970  ]  into different  multi zones by using Satellite image and Arc Map10.3,  zones of different traffic noise pollutions. Land zonings process like what achieved in this paper will help and of it’s of a high interest point for the future of Kirkuk city especially urban

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using game theory models to determine the profit maximization policies for PepsiCo and Coca Cola in Baghdad
...Show More Authors

(Use of models of game theory in determining the policies to maximize profits for the Pepsi Cola and Coca-Cola in the province of Baghdad)

Due to the importance of the theory of games especially theories of oligopoly in the study of the reality of competition among companies or governments and others the researcher linked theories of oligopoly to Econometrics to include all the policies used by companies after these theories were based on price and quantity only the researcher applied these theories to data taken from Pepsi Cola and Coca-Cola In Baghdad Steps of the solution where stated for the models proposed and solutions where found to be balance points is for the two companies according to the princi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 27 2025
Journal Name
Journal Of Physical Education
Predicting Grip Angle Using Some Kinematical Variables Of Leaving and Flight In Parallel Bar In Men's Gymnastics (Qatar 2016)
...Show More Authors

View Publication
Publication Date
Fri Dec 01 2023
Journal Name
Case Studies In Chemical And Environmental Engineering
Removal of copper from a simulated wastewater by electromembrane extraction technique using a novel electrolytic cell provided with a flat polypropylene membrane infused with 1-octanol and DEHP as a carrier
...Show More Authors

View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Wed Feb 20 2019
Journal Name
Iraqi Journal Of Physics
Preparation of polyaniline polymer and using it as a Vapor sensor of acids
...Show More Authors

 Polyaniline organic Semiconductor polymer was prepared by oxidation polymerization by adding hydrochloric acid concentration of 0.1M and potassium per sulfate concentration of 0.2M to 0.1M of aniline at room temperature, the polymer was deposited at glass substrate, the structural and optical properties were studies through UV-VIS, IR, XRD measurements, films have been operated as a sensor of vapor  H2SO4 and HCl  acids.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 02 2011
Journal Name
Journal Of Educational And Psychological Researches
School s’ Violence and its relation to academic Failed and School s’ Drop - Out among Intermediate stage Pupils
...Show More Authors

The present research aims to know the relation of Violence on academic Failed and School s’ Drop - out among Intermediate stage Pupils. The sample of the research reached (400) male and female pupils (failed and not failed ), and (69) male and female that Drop – out from Intermediate stage. The researcher used scale of Violence that constructed by (AL- qaysi , 2004) after she got Validity and Reliability to it . So that she used t- test for one sample, t- test for two independent sample, and Person correlation coefficient as a statistical means. The research reached to the results that indicates raising of level of Violence among the Intermediate stage pupils (failed and not failed) and the male and female that Drop – out from Inte

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 27 2025
Journal Name
Journal Of College Of Law For Legal And Political Sciences
Management's responsibility for breach of investment administrative contracts
...Show More Authors

View Publication
Publication Date
Thu Nov 27 2025
Journal Name
Journal Of Studies And Researches Of Sport Education
The reality of women's sports in Basra Governorate
...Show More Authors

In our current era, women need to practice sports activities in order to compensate for the lack of movement. The development of life and the introduction of technology in all fields contributed to reducing body movements to the maximum. Many movements were also shortened, and some parts of the body became almost static. All machines became available in homes. Necessary to help women clean and cook. The presence of transportation also restricted women, so the walking sport that women used to practice when they went shopping in nearby places or to visit friends disappeared. As a result, many health problems emerged, prompting some developed countries to allocate financial aid with the help of insurance companies to these patients.The researc

... Show More
View Publication