Preferred Language
Articles
/
bsj-3190
Analysing Iraqi Railways Network by Applying Specific Criteria Using the GIS Techniques
...Show More Authors

The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this study were collected and prepared to meet the requirements of network analyses within GIS. In this study, the current train stations in Iraq were analyzed and studied depending on accessibility value for those stations.  Also, to know the numbers of people who can reach those stations within a walking time of 20 minutes. So, this study aims to analyze the current train stations according to multiple criteria by using network analysis in order to find the serviced areas around those stations. Results will be presented as digital maps layers with their attribute tables that show the beneficiaries from those train stations and serviced areas around those stations depending on specific criteria, with a view to determine the size of this problem and to support the decision makers in case of locating new train stations within the best locations for it.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 06 2014
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Six Thinking Hats on Creative Thinking Among 10th Grade Female Students in Tulkarm District
...Show More Authors

The  purpose of  this study was to investigate the effect of six thinking hats on creative thinking among 10th grade female students in Tulkarm district. The sample comprises two sections of 10th grade female students (n=80) in Adawiya secondary School, The two sections were divided into two groups; one as an experimental group which works with six thinking hats, and the second as control group that learns traditionally. Creative thinking exam was used to measure the creative thinking with reliability (0.88).

The results of the study have shown the following:

There were statistically significant differences at (α ≤ 0.05) in the creative thinking among 10th grade female student

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2011
Journal Name
Al-khwarizmi Engineering Journal
The Effect of the Solution Heat Treatment on the Mechanical Properties of Aluminum-Copper Alloy (2024-T3) Using Rolling Process
...Show More Authors

The effect of solution heat treatment on the mechanical properties of Aluminum-Copper alloy. (2024-T3) by the rolling process is investigated. The solution heat treatment was implemented by heating the sheets to 480 C° and quenching them by water; then forming by rolling for many passes. And then natural aging is done for one month. Mechanical properties (tensile strength and hardness) are evaluated and the results are compared with the metal without treatment during the rolling process. ANSYS analysis is used to show the stresses distribution in the sheet during the rolling process.  It has been seen that good mechanical properties are evident in the alloy without heat treatment due to the strain hardening and also the mechanical

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Performance Improvement of Neural Network Based RLS Channel Estimators in MIMO-OFDM Systems
...Show More Authors

The objective of this study was tointroduce a recursive least squares (RLS) parameter estimatorenhanced by using a neural network (NN) to facilitate the computing of a bit error rate (BER) (error reduction) during channels estimation of a multiple input-multiple output orthogonal frequency division multiplexing (MIMO-OFDM) system over a Rayleigh multipath fading channel.Recursive least square is an efficient approach to neural network training:first, the neural network estimator learns to adapt to the channel variations then it estimates the channel frequency response. Simulation results show that the proposed method has better performance compared to the conventional methods least square (LS) and the original RLS and it is more robust a

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 14 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Personal Digital Assistant Acceptance in Nursing Education
...Show More Authors

Objective:To measure the acceptance level of the Personal Digital Assistance (PDA)’suse among nursing students as a tool of education in the Kingdom of Saudi Arabia. Methodology: Eighty-nine nursing students participated in this cross-sectional descriptive study by completing a questionnaire based on the Technology Acceptance Model (TAM) by Davis. Two dimensions were explored and evaluated; (1) the applicability of the TAM model in assessing this technology; and (2) the overall percentage of students’ agreement on the different TAM variables. Results: This study presented significant positive influence bet

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 26 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أثر استخدام التوقيع الرقمي في العمليات المصرفية الالكترونية
...Show More Authors

The purpose of this research is to identify the E-signing and its concept.

Due to the increasing role and importance of the E-trade in may countries, as it provide many advantages over the traditional trade. We have to deal with may E-trade aspects and tools in which the E-signing is the most important. In this research we will deal: first with the article approach- E-signing definition, Digital signing, its mechanism, requirements, types and features. Second: the practical approach: It has been implemented according to a questionnaire contain many questions some of them are comma, other an specialized in research hypothesis and some concern the obstacles faced the application of E-signing. The questionnaires been distillated to

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
استخدام الضمائر انت وانتم في الآدب الروسي الكلاسيكي
...Show More Authors

استخدام الضمائر انت وانتم في الآدب الروسي الكلاسيكي

View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact of supervisory control requirements on the financial performance of Islamic banks in Iraq: Case Study: Islamic Cooperation Bank for Investment and Development for the years (2015-2018)
...Show More Authors

Given the importance that the Iraqi banking system in general and Islamic banks in particular, there must be effective supervisory oversight of these banks, as supervisory oversight has an essential and effective role in the development and evaluation of the performance of banks, through the application of legal controls and rules. Banking aimed at making sure that its financial centers are safe, protecting depositors' funds, and achieving both monetary and economic stability. This research studied and evaluates the mechanisms and tools used by the Central Bank of Iraq in the supervision and supervision of these banks. Therefore, the research aimed to measure the type and direction of the relationship between the requirements of supervis

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF