Preferred Language
Articles
/
alkej-151
Field Programmable Gate Array (FPGA) Model of Intelligent Traffic Light System with Saving Power
...Show More Authors

In this paper, a FPGA model of intelligent traffic light system with power saving was built. The intelligent traffic light system consists of sensors placed on the side's ends of the intersection to sense the presence or absence of vehicles. This system reduces the waiting time when the traffic light is red, through the transition from traffic light state to the other state, when the first state spends a lot of time, because there are no more vehicles. The proposed system is built using VHDL, simulated using Xilinx ISE 9.2i package, and implemented using Spartan-3A XC3S700A FPGA kit. Implementation and Simulation behavioral model results show that the proposed intelligent traffic light system model satisfies the specified operational requirements.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 28 2018
Journal Name
مؤتمرات الآداب والعلوم الانسانية والطبيعية
Analyzing the Content of the Science Textbook for 7th Grade Iraqi Schools in Light of Educational Concepts of Sustainable Development
...Show More Authors

The aim of this research is to analyze the content of the science textbook for 7th grade Iraqi schools in the light of the educational concepts of sustainable development, the science textbook (1st edition), for the academic year 2017-2018. To this end, the researchers prepared list of issues in the light of the educational concepts of sustainable development, consisted of (13) issues, branched to (51) subissues, presented to a group of arbitrators and specialists in science curriculum and methods of teaching. The researchers analyzed the content of the 7th grade science textbook, in the light of the list that is built, the idea has been adopted as a unit of analysis. One of the most important findings is attention to neglected sub-issues o

... Show More
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Level of Spiritual Intelligence Among Students of Educational Psychology Course at Jerash University in The Light of Some variables
...Show More Authors

This study aimed to determine the level of spiritual intelligence among students of educational psychology course at the Jerash University. and whether this level of varies depend on the gender of the student as well as the college type. The study sample consisted of (180) male and female students of bachelor students at the University Jerash, in the second semester of academic year2014-2015. The main results of the study were that the level of spiritual
Intelligence of Jerash University students was high. More over There were no statistically significant differences at the level of significance (0.05) due to the effect of gender, college type or academic achievement

View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Contemporary trends for the treatment of the prisoner in the light of the minimum rules for the treatment of prisoners
...Show More Authors

The issue of the prisoners' rights and the way of dealing with them is not just a minor or
primary issue according to the contemporary attitudes to deal with criminals, but it is a fatal
issue that goes with the development of life and comprehension of human rights. As the
criminal is considered as a human-being who can be reformed and qualified, according to the
aims of the contemporary social service the prisoner is regarded as an idle human source who
can be reformed, treated and qualified so as to make him participate to improve his family and
society in the end.
This study aims at reconstructing the prisons bases when applying the laws of the lowest
level of treatment through the research of oppositions, atti

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
Making Decisions in Academic Department Councils from the Point of View of Faculty Members in the Light of Knowledge Management
...Show More Authors

Abstract

The study aims to identify the reality of knowledge management in decision-making in academic departments from the point of view of faculty members at Blonde University. It also aims to propose mechanisms and suggestions to improve decision-making in the academic departments of the university in light of the management of knowledge. To achieve the objectives of the study, a descriptive method was used, in which a questionnaire consisted of (40) items administered to (137) participants of the faculty members. The results of the study indicated that the reality of the application of knowledge management in the decision-making process showed a high score mean.  There are no statistically significant d

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 27 2018
Journal Name
Mustansiria Dental Journal
The Effect of Modified Carisolv Gel on Surface Roughness of two Different Types of Ceramic Materials Using Light Polarizing Microscope
...Show More Authors

This in vitro study evaluated the influence of chemomechanical caries removal solution on the surface topography of metal-ceramic feldspar porcelain (MAJOR ceramic) and All-ceramic feldspar porcelain (Vita Alpha) using light polarizing microscope. Forty specimens of MAJOR ceramic and forty specimens of Vita Alpha ceramic of (12mm diameter & 3mm height) were prepared .All specimens were polished with silicon polishing burs, cleaned, autoglazed and stored in 37°C before exposure to Carisolv. Thirty specimens of each material randomly exposed to Carisolv gel for 5, 10 and 20 minutes respectively, other ten specimens were not, to act as control group. All specimens were subjected to surface roughness test by profilometer and evalua

... Show More
View Publication
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Assessing the quality of health services applied research 5qs in Baghdad teaching hospital
...Show More Authors

Abstract

       This research aims to assess and measure the quality of health services provided by the Baghdad Educational Hospital using  five dimensions of 5Qs , Developer model by (Zinelidin), 2006), the problem of the research is to try to determine the quality of health services provided at the hospital as well as the investigation of the existence of the elements of quality contribute to achieve the requirements of customers and their needs, and used for the purposes of this research two approaches, first used Applied Research to 5Qs dimension model and use the Checklist as a Key tool to collection and analysis of data and the second descriptive analytical me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Al-kindy College Medical Journal
Practice & Opinion of Doctors in Hospitals toward Referral System in Iraq
...Show More Authors

Background: Primary Health care (PHC) is unanimous to be the cornerstone of a person-centered health system. While the adoption of a well-function, two-way, and organized referral system is the mainstay in the development of an efficient healthcare delivery system.  

Objective: To Assess the practice & opinion of doctors in the hospitals toward the referral system.  to determine the doctors in the hospital's commitment to referral system instructions and guidelines.

Subjects and Methods: A cross-sectional study with analytic elements was conducted in nine Iraqi governorates. Eight doctors from each health directorate, resulting in a tot

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Construction of Graduation Certificate Issuing System Based on Digital Signature Technique
...Show More Authors

With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and s

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref