Preferred Language
Articles
/
eBeJI44BVTCNdQwC_jIX
THE EFFECT OF TRAINING NETWORK TRAINING IN TWO WAYS, HIGH INTERVAL TRAINING AND REPETITION TO DEVELOP SPEED ENDURANCE ADAPT HEART RATE AND ACHIEVE 5000 METERS YOUTH
...Show More Authors

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Perceived organizational support and impact on high performance Analytical research in the colleges of the University of Baghdad
...Show More Authors

     The research tagged (Perceived Organizational Support in High Performance) deals with identifying the extent of the impact of perceived organizational support as an explanatory variable on high performance as a response variable for the purpose of reaching appropriate mechanisms that enable colleges of the University of Baghdad to exploit the perceived organizational support in achieving the required high performance and pursuit of its goals. The researcher relied on the descriptive and analytical approach in carrying out the research. An intentional sample was selected and reached (70) persons from the higher leadership of the colleges represented by (deans, assistants deans, heads of departments) that r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
FLUTTER SPEED LIMITS OF SUBSONIC WINGS
...Show More Authors

Flutter is a phenomenon resulting from the interaction between aerodynamic and structural dynamic forces and may lead to a destructive instability. The aerodynamic forces on an oscillating airfoil combination of two independent degrees of freedom have been determined. The problem resolves itself into the solution of certain definite integrals, which have been identified as Theodorsen functions. The theory, being based on potential flow and the Kutta condition, is fundamentally equivalent to the conventional wing-ection theory relating to the steady case. The mechanism of aerodynamic instability has been analyzed in detail. An exact solution, involving potential flow and the adoption of the Kutta condition, has been analyzed in detail. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Al–bahith Al–a'alami
University Youth Attitudes towards Electronic Advertisements and their Relationship to the Behavior of the Consumer A Field Study of a Sample of Students of the College of Mass-Communication / University of Baghdad as a Model
...Show More Authors

This research aims at identifying the communicative habits and content reflections on the communication process, especially the young audience which is one of the main group for whom the announcements are made. Because young people face life with passion and aspiration making them respond to each effect used by the media in the design of the advertising using all the effective techniques, attractive methods for young children like depending on drama, technical tricks, music and logos easily to be remembered and responded to the desires of the young in their entertainment. This research also aims at identifying the impact of the internet as a channel of commercial advertising on the purchasing behavior of young people at the universities

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Proceedings Of The 31th Minisymposium
Towards the Requirement-Driven Generation and Evaluation of Hyperledger Fabric Network Designs
...Show More Authors

View Publication
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Global Pharma Technology
Some Biochemical Parameters in Congestive Heart Failure Patients in Baghdad City
...Show More Authors

Scopus
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Apr 14 2015
Journal Name
Journal Of Physical Education
Analyze study for basic shooting kind in basketball and it relation with teams rank for youth players
...Show More Authors

The levels of shooting in basketball not very good appears un healthy phenomenon for age stages especially youth players on Iraq and therefore there is lower level in skills especially shooting that seems the players represent their players not good levels which cause difficult in choosing players for youth national team. The research sample were youth teams in Baghdad for season 2012-2013 their birth 1996 and the number teams (7) and after getting results and treat it statically the important ones were : there is a large number of failure attempts on success ones in basic shooting in basketball for youth teams in Baghdad teams (2012-2013) season and basic shooting have effective participation (positive relation) in youth teams ranking in B

... Show More
Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Exchange Rate of Iraqi Dinar between De facto Regime and De jure Regime in the Iraq during (2004-2012)
...Show More Authors

         The understanding exchange rate policy is fundamental in order to identify the mechanism by which works out macroeconomic, And the vital for macroeconomic analysis and empirical work to differentiate between the de facto regimes and de jure regimes, Where the proved surveys and studies issued by the international monetary fund that there is divergence between the de facto regime (Regime of exchange applied by the country actually) and between the de jure regime (Regime de jure through the documents and formal writings of officials of the central bank), And launched studies on the de facto regime (Being a the basis of evaluating monetary policy) Stabilized (peg-like)arrangements or

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF