Preferred Language
Articles
/
QBbZCocBVTCNdQwCqTLj
Security Problems in an RFID System
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
solving linear fractional programming problems (LFP) by Using denominator function restriction method and compare it with linear transformations method
...Show More Authors

 

Abstract

The use of modern scientific methods and techniques, is considered important topics to solve many of the problems which face some sector, including industrial, service and health. The researcher always intends to use modern methods characterized by accuracy, clarity and speed to reach the optimal solution and be easy at the same time in terms of understanding and application.

the research presented this comparison between the two methods of solution for linear fractional programming models which are linear transformation for Charnas & Cooper , and denominator function restriction method through applied on the oil heaters and gas cookers plant , where the show after reac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Problems and needs of Baghdad university students from perspective of college of political sciences and college of engineering’s students
...Show More Authors

The current research aims to identify the problems and needs for both college of political science and college of engineering’s students. The sample was (100) male and female student. The results showed bunch of problems which could be organized descendingly, the scientific domain ranged between (2 - 2.42), the mean of the psychological domain was (2.85), the moral domain ranged between (2.2 – 2.28)m the problems of study earned (2.30), the material domain got (1.95), the medical and social domain obtained (1.925), and finally, the family domain received (1.887).

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Applied Engineering Science
Design and implementation of a smart home automation system based on global system for mobile communications
...Show More Authors

Recently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Advanced Research In Dynamical And Control Systems
Reliable and valid questionnaire for organizational, system, and individual factors to utilize cloud health information system
...Show More Authors

Scopus
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Engineering
Development of Bridges Maintenance Management System based on Geographic Information System Techniques (Case study: AlMuthanna \ Iraq)
...Show More Authors

A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated vi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue May 09 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
TIME MANAGEMENT AND WORK PRESSURE AND THEIR RELATIONSHIP TO ADMINISTRATIVE LEADERSHIP/ A CASE STUDY AT THE HIGHER INSTITUTE FOR ADMINISTRATIVE DEVELOPMENT OF SECURITY AND ADMINISRATIVE: TIME MANAGEMENT AND WORK PRESSURE AND THEIR RELATIONSHIP TO ADMINISTRATIVE LEADERSHIP/ A CASE STUDY AT THE HIGHER INSTITUTE FOR ADMINISTRATIVE DEVELOPMENT OF SECURITY AND ADMINISRATIVE
...Show More Authors

The research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of th

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
The status of prophecy in the Islamic faith in light of the glorious Kharida system
...Show More Authors

Knowing the Messengers, peace and blessings be upon them, and explaining their obligatory, impossible, and permissible qualities is a legal necessity. It is a rooting of the faith, a means of understanding the Sharia, and a preventer from falling into the scourge of denial and bad manners against them. Therefore, sound belief in their presence is a major reason for the validity of the faith in the aspect of divinity and unseen hearing. Studying the status of prophethood is an urgent necessity in a time in which knowledge is scarce and attachment to the Messenger, may God Almighty’s prayers and peace be upon him, his family, and his companions, is weak, and suspicions and ideas hostile to the faith abound until we begin to hear - unfort

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Transylvanian Review
The role of the ABC system in determining the costs of services in Iraqi banks
...Show More Authors

The role of the ABC system in determining the costs of services in Iraqi banks

Publication Date
Sat Sep 12 2020
Journal Name
Al-kindy College Medical Journal
Spectrum of central nervous system infections in neurosciences hospital in two years : a retrospective study
...Show More Authors

Background :Infectious disorders in general have high morbidity and mortality.. CNS infections include many disorders like bacterial meningitis, tuberculous and other subacute and chronic meningitis, viral meningitis, cerebral abscess, spinal cord infections, and others.
Objective: To assess our locality about prevalence of CNS infections , to have more awareness regarding CNS infections, and to try to find the proper way to reduce their prevalence and to treat them in appropriate way.
Method :We revised the records of all the cases of CNS infections excluding cases of spinal cord infections who were admitted in the wards of neuroscience hospital over the previous two years ( from July/2010 to June 2012 ),those were 132 cases.Seaso

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF