Preferred Language
Articles
/
9Ibd0YYBIXToZYALe7QA
Effects of non-uniform fin arrangement and size on the thermal response of a vertical latent heat triple-tube heat exchanger
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
The Effectiveness of Using Narrative Approach in Teaching the Course of Interpretation (Tafseer) in Developing the First Intermediate Female Students’ Conceptual Understanding
...Show More Authors

This study aims at examining the effectiveness of using the narrative approach in teaching the Interpretation of the Qur'an course in the development of conceptual comprehension among first-grade middle school female students. To achieve the objective of this study, a quantitative quasi-experimental design has been used. The sample consisted of first-grade middle school female students at "the third middle school" in Buraidah city, as this school suits the objective of the study. A test of conceptual understanding has been built by the researchers according to a list of conceptual understating skills at a significance level of α ≤ 0.05. Results have shown that there are statistically significant differences at the level (α ≤ 0,05)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 24 2023
Journal Name
Journal Of University Of Kerbala
The occurrence of two species of the genus Myxobolus Bütschli, 1882 (Myxozoa: Myxosporea) for the first time in Iraq from freshwater fishes.
...Show More Authors

The occurrence of two species of the genus Myxobolus Bütschli, 1882 (Myxozoa: Myxosporea) for the first time in Iraq from freshwater fishes.

Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The role of the requirements of Total Quality Environmental Management in promoting environmental sustainability-An Empirical Study in the Iraqi Drilling Company
...Show More Authors

Abstract

quality issue is the only issue the interesting in recent years of the last century, but also came out of sync with the other issue is the issue of environment, Where they have become represent two sides of one currency, challenges faced by the world and raised by the environmental problems have made industrial organizations pay great attention to the environment by improving their environmental performance, and that's where the oil industry is one of the most dangerous industries, influential and damaging to the environment due to the organizations move away from oil for adoption The application of EMS then a tool to improve environmental performance has been chosen sam

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
The Epistemological The Epistemological Foundations for Comparison of Religions by al-Amiri: The Epistemological Foundations for Comparison of Religions by al-Amiri
...Show More Authors

 

 Research topic: (The Epistemological Foundations for Comparison of Religions by al-Amiri)

The research sought to study the topic with: a descriptive methodology by investigating the components of al-Amiri's approach to the interfaith comparison. And analytical, by showing the applied perception of an objective model in the comparison of religions to answer two questions: What are the cognitive foundations of al-Amiri? And what is his approach to establishing an objective comparison between religions?

The research started by introducing Abu al-Hassan al-Amiri, and then presented four topics: An introduction to al-Amiri's efforts in the interfaith comparison, his knowledge foundations, an applied model

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Aug 17 2022
Journal Name
Aip Conference Proceedings
Remove phenolic pollutant on Bentonite surface nanopowder
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
On Tˉ-pure sub-acts over moniods
...Show More Authors

The notion of a Tˉ-pure sub-act and so Tˉ-pure sub-act relative to sub-act are introduced. Some properties of these concepts have been studied.

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More