Time is very important in educational institutions. It is also one of our contemporary problem ‚as time is a clear – cut and limited factor‚ it demands that administrators should monitor it by administering and monitoring the principles of time.
Hence‚ the researcher attempts to identify the skills of administrating time and the reasons that cause the waste of time of the Heads of Departments at university of Baghdad.
Significance of the research:
Time is very important to all educational administrators and one of them is the institutions of Higher education. One of the
... Show MoreIn this research, main types of optical coatings are presented which are used as covers for solar cells, these coatings are reflect the infrared (heat) from the solar cell to increase the efficiency of the cell (because the cell’s efficiency is inversely proportional to the heat), then the theoretical and mathematical description of these optical coatings are presented, and an optical design is designed to meet this objective, its optical transmittance was calculated using (MATLAB R2008a) and (Open Filters 1.0.2) programs
Agricultural lands have great importance in people's lives, and their exploitation has a great impact on strengthening the national economy. Therefore, countries have given great importance to this sector, and because of the importance of this sector, the state has given large areas of these lands to the farmers to invest in agriculture, and among these farmers are those who died and left behind children who took up crafts. Agriculture, for fear that these agricultural lands would be abandoned and turned into waste lands, a land system was introduced called (regular distribu- tion), which corresponds to (legitimate inheritance). Under this system, these lands were trans- ferred to the children of farmers who died so that the process of inve
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
After the political change in Iraq in 2003, Iraq witnessed a stage of social and political development and the strengthening of the legal foundations of the state system, by the approval of the permanent Iraqi constitution of 2005, and stipulating the quota system.
Iraqi women participated in the parliamentary elections from 2005 until 2021, and despite the participation of Iraqi women in all elections, there are challenges that women in Iraq face that prevent their political participation in general and participation in parliament in particular. There are factors behind this, including those related to Iraqi women themselves, including those concerning the political institution and factors related to the nature of society, and it
... Show MoreBeen Antkhav three isolates of soil classified as follows: Bacillus G3 consists of spores, G12, G27 led Pal NTG treatment to kill part of the cells of the three isolates varying degrees treatment also led to mutations urged resistance to streptomycin and rifampicin and double mutations
Increased interest in the subject of the image because of its great and growing link to the life of the individual and society and its impact on the overall political, economic and cultural conditions. This interest is no longer confined to the images of people or institutions, but has become beyond that to the images of countries and peoples and the impact on bilateral relations between them,
However, we find that the image of the Iraqi abroad remained vague and has not been scientifically recognized and the most that we can generalize are the features of the image of Arabs and Muslims abroad; and assume that the image of the Iraqi applies to them as the Iraqi is in the end an Arab or Muslim.
Based on this, the research
... Show MoreResearch Summary
The research revolves around the collection of pending hadiths on Abdullah bin Amr bin Al-Aas, may God be pleased with them, and it is required in these hadiths that they be among those in which there is no room for diligence, such as telling about unseen matters, signs of the Hour, or a statement of virtue and reward for obedience, or punishment for disobedience.
The research consists of an introduction, two topics, and a conclusion of the first topic in the translation of Abdullah bin Amr bin Al-Aas, and the second topic, the pending hadiths of Abdullah bin Amr bin Al-Aas, may God be pleased with them, in which there is no room for diligence in collecting and studying
At the end of this rese
In this paper, we will study non parametric model when the response variable have missing data (non response) in observations it under missing mechanisms MCAR, then we suggest Kernel-Based Non-Parametric Single-Imputation instead of missing value and compare it with Nearest Neighbor Imputation by using the simulation about some difference models and with difference cases as the sample size, variance and rate of missing data.