Preferred Language
Articles
/
KRb6uYcBVTCNdQwC91_z
Designed Algorithms for Compute the Tenser Product of Representation for the Special Linear Groups
...Show More Authors

The main objective of this paper is to designed algorithms and implemented in the construction of the main program designated for the determination the tenser product of representation for the special linear group.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Choosing the best method for estimating the survival function of inverse Gompertz distribution by using Integral mean squares error (IMSE)
...Show More Authors

In this research , we study the inverse Gompertz distribution (IG) and estimate the  survival function of the distribution , and the survival function was evaluated using three methods (the Maximum likelihood, least squares, and percentiles estimators) and choosing the best method estimation ,as it was found that the best method for estimating the survival function is the squares-least method because it has the lowest IMSE and for all sample sizes

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Implement some basic health accreditation standards Issued by the Health Care Accreditation Council (HCAC) for auditing the Performance of Hospitals: Applied research at the Education Children Protection Hospital
...Show More Authors

The health care provided by health institutions and all kinds suffers from many problems, and since the health services provided are related to human life, it is necessary to shed light on this activity and identify the causes of these problems. This research aims to Definition of health institutions (hospitals) Performance audit of these institutions according to the latest indicators, which are the standards of health accreditation for hospitals, specifically the basic standards issued by the Health Care Accreditation Council (HCAC) to reach the level of performance and Knowledge of Constraints that lead to in an acceptable manner consistent with the approved standards. In theoretical and practical study, a number of conclusions were r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The dominance of the consumption pattern of government Expenditure and its impact on economic growth of Iraq for the period 2003-2014
...Show More Authors

The importance of government Expenditure policy in economy come from its role leading to the mitigation and adjustment of fluctuations in macroeconomic variables caused by imbalance between aggregate demand and aggregate supply,  It is associated with the efficient management of government Expenditure to reinforcement the relationship between government Expenditure and the overall economic system .

Regarding the Iraqi economy,the increasing in financial rentier after the political change in 2003 has led to finance the budgets Characterized by consumption,The government Expenditure employed to encourage government employment in services jobs, and find different channels for the distribution of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Use of Remote Sensing in the assessment and classification of land degradation in the district of Mahmudiya for the period 1990-2007
...Show More Authors

The study consisted in the development and use of a practical method to detect and
monitor, analyze and produce maps of changes in land use and land cover in the district of
Mahmudiya in Baghdad during the period 1990-2007 using the applications of remote sensing
techniques and with the assisstant of geographic information systems (GIS),as a valuable
contribution to land degradation studies.
This study is based maiuly on the processing on two subsets of landsat5 TM images picked up
in August 1990 and 2007 respectively in order to facilitate comparision and were thengeometrically and radiometrcally calibrated ,to used for digital classification purposes using
maximum liklihoods classification or six spectral bands of

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 16 2019
Journal Name
Al–bahith Al–a'alami
News frames for the phenomenon of terrorism in international satellite channels directed in Arabic An analytical study of the main news bulletins in the Russian channel today 1/2/31/5/2018
...Show More Authors

International satellite channels in Arabic are targeted to the region with their news bulletins and their innovative programs, attracting the interest of the Arab viewers in their news articles and programs with new ideas and methods as well as high technology in the production and synthesis of videos. Therefore, they work on framing the above, And the media policy that governs, so focused the problem of the study to try to answer the question of the President is how to frame the international satellite channels in Arabic to the phenomenon of terrorism? What are the aspects that are working to highlight and aspects that try to hide? The study adopted the survey methodology for the main news bulletins in the Russian channel today for the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Psychological Security and Its Relation to Motivation for Achievement of Social Researchers Working in the Courts
...Show More Authors

The research aims to measure the psychological security of social working in the courts, to measure the motivation of achievement for social researchers working in the courts. In addition to, identify the Psychological security and its relation to the motivation of achievement for social researchers working in the courts. To achieve these aims, the researcher adopted two scales: Maslow scale for Psychological security, which was translated to Arabic by Dwany and Dirany 1983 consisted of (75) items. The second scale is Othman scale for achievement motivation 2014 consisted of (24) items. The two scales had been applied to a sample consisted of (100) social researchers working in the courts of Baghdad with its two branches Al-karkh and Al-

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
A Comparative Study of Single-Constraint Routing in Wireless Mesh Networks Using Different Dynamic Programming Algorithms
...Show More Authors

Finding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 13 2011
Journal Name
Baghdad Science Journal
Effects of Organic Pollution on some Fish and Benthic Macroinvertebrate Groups in Rivers Tigris and Diyala at Baghdad Area.
...Show More Authors

Various activities taking place within the city of Baghdad have significantly contributed to organic pollution in Rivers Tigris and Diyala. The present study aimed to assess some physical, chemical and biological aspects of six sites on Rivers Tigris and Diyala as they flow through the city of Baghdad. Monthly samples were collected for the period January to December, 2005. Marked differences in the physical and chemical characteristics of water were noted between the two rivers’ sites. Average values during the study period of dissolved oxygen, biochemical oxygen demand, particulate organic matter, nitrate, phosphate and total dissolved solids for Tigris and Diyala were 7.8,4.7; 2.4,10.4; 350.1,921.4;7.8,13.9;1.2,4.8;814,2176 mg / l re

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref