MM Abdulwahhab, kufa Journal for Nursing sciences, 2017 - Cited by 1
Due to the easily access to the satellite images, Google Earth (GE) images have become more popular than other online virtual globes. However, the popularity of GE is not an indication of its accuracy. A considerable amount of literature has been published on evaluating the positional accuracy of GE data; however there are few studies which have investigated the subject of improving the GE accuracy. In this paper, a practical method for enhancing the horizontal positional accuracy of GE is suggested by establishing ten reference points, in University of Baghdad main campus, using different Global Navigation Satellite System (GNSS) observation techniques: Rapid Static, Post-Processing Kinematic, and Network. Then, the GE image for the study
... Show MoreCurrently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreSurface modeling utilizing Bezier technique is one of the more important tool in computer aided geometric design (CAD). The aim of this work is to design and implement multi-patches Bezier free-form surface. The technique has an effective contribution in technology domains and in ships, aircrafts, and cars industry, moreover for its wide utilization in making the molds. This work is includes the synthesis of these patches in a method that is allow the participation of these control point for the merge of the patches, and the confluence of patches at similar degree sides due to degree variation per patch. The model has been implemented to represent the surface. The interior data of the desired surfaces designed by M
... Show MoreThe main purpose of this research is to diagnose the role of the Knowledge Accumulation of Human Resources KAHR in Strategic Performance SP, and for that, the research was applied to the represented sample by the administrative leaders consisting of (108) individuals distributed according to their positions and the organizational structure of the ministry. Correlations, effects, and benefits from generalizing the results in the field of research. The research involved a mixed-methods approach through two stages. During the first stage, the researcher gathered quantitative data from a questionnaire. The second stage gathered qualitative data to explore the survey results more deeply by conducting individual interviews with a sub-sample of
... Show MoreThis research aimed at studying the role of calculated knowledge an its efficiency in improving the performance especially most of the organizations are living within knowledge era which concentrate on new technology investment in different fields of modern live . Under the scientific trends towards the economy of calculated knowledge which depend basically on new computer program in order to utilize the knowledge to raise the level of work performance exploiting different resources in the best way that helps the organizations to achieve their objectives because the information technology and computer programs became a means of survival and indispensible instrument within the developed world which depend on prosperity . progress
... Show MoreThis research Sought to Determine the Relationship and impact between the tax knowledge in dimensions of the tax compliance costs (monetary costs, time costs, psychic costs) Since the sample included 81 individuals represented by the Executive directors and Financial and Accountant working in the Joint-stock company, A questionnaire was used as a tool for data collection and its analysis. For the purpose of analyzing the research data the statistical package for social science, SPSS. The most important tools used in the statistical analysis are:(standard deviation, and simple linear regression, percentages, arithmetic mean, Cronbach's alpha, F-test, T- Test). The research found a weakness attenti
... Show MoreThe research aims to study and definition of the concept of creative accounting and motives adopted by the management of companies to achieve their own goals and their impact on the reliability of the financial statements and the tax settling accounts and whether that tax administration is able to detect and limit the creative accounting practices and impose legal sanctions deterrent against companies The research has come to a set of conclusions, including:
- The administration motives in the use of creative accounting methods, some internal motives related to the interests of the administration in maximizing profits to increase incentives and rewards, others are external, such as the impact on stock prices or reduce the am
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show More