Preferred Language
Articles
/
hBc3_pIBVTCNdQwCJ8T1
Organizational Machiavellianism and Its Impact on Employees’ Passion: A Field Study on a Sample of Electronic Payment Companies in Iraq
...Show More Authors

View Publication
Publication Date
Sat Sep 12 2020
Journal Name
Al-kindy College Medical Journal
A Brief view on the pediatric COVID- 19 pandemic
...Show More Authors

The world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Neurocomputing
A survey on video compression fast block matching algorithms
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus (1)
Scopus
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The impact of political thinking on the decision maker in analyzing the strategic environment of the state (applied study in the Iraqi Ministry of Finance)
...Show More Authors

The Political Thinking Regarded as an important element for the formulation of the stat, weather in its formation, the structure of it s entity, its political system and it s governmental instruments .The political thinking can not act without determined strategy, So they intend to work hard to formulate a railed strategy that make them able to determine its  directions to general issues.

   The Study aimed to solve the problem through the following question:

1- What are the levels of Political Thinking and Strategic Analysis in the financial ministry?

2- What are the relation ship between the dimensions of Political  T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
term of the first difference between the Imam of the Two Holy Mosques, Imam Taj Al-Din al-Subki and its impact on the doctrine of Al-Shafeiyah
...Show More Authors

 

Praise be to Allah, the Lord of the Worlds, the best prayer and the best prayer, on our master Muhammad, and on his pure God, and his companions and the faithful, and who followed them by charity to the day of religion. This relationship between emphasis, is a sincere, and this harmony, such as the relationship between water, and the green, but it is good, but, with greenery, it is better, and as well as alone, is a beautiful view, but the most beautiful, with the most beautiful. From here he was starting on myself in writing the fundamentalist research of jurisprudence, to show the depth of this interconnection. The doctrine as a new term, then the taj al-Din al-Suobki came after three centuries, and a

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Engineering / University Of Baghdad
Subsurface Water Retention a Technology for Increasing the Field Use Efficiency and Water Saving Values of Cucumber Plant
...Show More Authors

The technology of subsurface soil water retention (SWRT) uses a polyethylene trough that is fixed under the root zone of the plant. It is a modern technology to increase the values of water use efficiency, plant productivity and saving irrigation water by applying as little irrigation water as possible. This study work aims at improving the crop yield and water use efficiency of a cucumber plant with less applied irrigation water by installing membrane trough below the soil surface. The field experiment was conducted in the Hawr Rajab District of Baghdad Governorate in Winter 2018 for testing various trickle irrigation systems. Two agricultural treatment plots were utilized in a greenhouse for the comparison. Plot T1 has used a subsurface t

... Show More
View Publication
Crossref (1)
Crossref