Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreIn this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti
... Show MoreThe current research seeks to achieve several objectives, including knowing the extent of the audit directorate of the Ministry of Construction, Housing and General Municipalities of the International Standard (ISO19011:2018) regarding determining the efficiency and evaluation of auditors and diagnosing the gap between requirements and application and knowing the reasons for not applying some of the items in the standard, starting from the problem, The field raised the following question (Does the audit directorate determine the efficiency and evaluation of auditors according to the standard ISO19011:2018?), and the importance of research lies in determining the return that can be achieved by the directorate through its application of stand
... Show MoreThe aim of this study is to utilize the behavior of a mathematical model consisting of three-species with Lotka Volterra functional response with incorporating of fear and hunting cooperation factors with both juvenile and adult predators. The existence of equilibrium points of the system was discussed the conditions with variables. The behavior of model referred by local stability in nearness of any an equilibrium point and the conditions for the method of approximating the solution has been studied locally. We define a suitable Lyapunov function that covers every element of the nonlinear system and illustrate that it works. The effect of the death factor was observed in some periods, leading to non-stability. To confirm the theore
... Show MoreSurface water samples from different locations within Tigris River's boundaries in Baghdad city have been analyzed for drinking purposes. Correlation coefficients among different parameters were determined. An attempt has been made to develop linear regression equations to predict the concentration of water quality constituents having significant correlation coefficients with electrical conductivity (EC). This study aims to find five regression models produced and validated using electrical conductivity as a predictor to predict total hardness (TH), calcium (Ca), chloride (Cl), sulfate (SO4), and total dissolved solids (TDS). The five models showed good/excellent prediction ability of the parameters mentioned
... Show MoreThis paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreRationale, aims and objectives: A review of studies published over the last six years gives update about this hot topic. In the middle of COVID-19 pandemic, this study findings can help understand how population may perceive vaccinations. The objectives of this study were to review the literature covering the perceptions about influenza vaccines and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM). Methods: A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions, and Middle East. Empirical studies that dealt with people/ HCW perceptions of influenza vaccine in the Middle East and writt
... Show MoreSeveral stress-strain models were used to predict the strengths of steel fiber reinforced concrete, which are distinctive of the material. However, insufficient research has been done on the influence of hybrid fiber combinations (comprising two or more distinct fibers) on the characteristics of concrete. For this reason, the researchers conducted an experimental program to determine the stress-strain relationship of 30 concrete samples reinforced with two distinct fibers (a hybrid of polyvinyl alcohol and steel fibers), with compressive strengths ranging from 40 to 120 MPa. A total of 80% of the experimental results were used to develop a new empirical stress-strain model, which was accomplished through the application of the parti
... Show More