Preferred Language
Articles
/
jcoeduw-490
The Role of inherited occupations in cohesion of the family system
...Show More Authors

This study aims to study the inherited occupations which are considered to be a cultural, civilized and social legacy that effected by the Prevailing social and economic circumstances in the Iraqi society .
The study aimed to achieve several goals, including:
Identify the relationship between the urbanization and inherited occupations in the old city Al-Karkh.
Identify the relationship between the ecological construction and inherited occupations in the old city Al-Karkh.
Recognize the factors and motives inherited occupations in the study area .Identify the role of inherited occupations in promoting opportunities cohesion of the family system in the study area.
The field of the study had concentrated on a sample of families which are working in the inherited occupations, the samples were 300 families that had been choose by the intentional method of choosing samples, and also 10 Respondents as model to the case study .The study used a combination of statistical methods to achieve the objectives of the study.
Most important results that recommendation are:
Housing near the work place of the most important factors contributing to the inheritance of professions .Most of the Respondents confirmed that the inherited occupations Contribute to the cohesion of the family system .Most of the Respondents confirmed that the respect for the opinions of the family members if the occupations manners is the main reasonin the cohesion of the family.
The most important recommendations of the study are:
A recommendation to the responsible authorities to grant licenses and facilities for professional occupations popular culture and organization of the mechanisms of action in order to achieve growth opportunities for the local community.
To activate the role of social workers to monitor the problems and obstacles workers inherited occupations and problems of their families and their working conditions.
A recommendation to the competent authorities to organize courses and conferences that contribute to the development of scientific research in the field of study of local communities as to contribute in their development.
The letter also included a set of proposals that contribute to the development enhancing the developmental advancement opportunities for careers legacy and the community.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Engineering
Identifying Failure Factors in the Implementation of Residential Complex Projects in Iraq
...Show More Authors

Residential complexes have witnessed a great demand in most countries worldwide, as they are one of the main infrastructure elements, in addition to achieving a developed urban landscape. However, complex residential projects in developing countries face various factors that could be improved in their implementation, especially in Iraq. Sixty-two experts in residential complex projects were interviewed and surveyed to verify these projects' failure factors,. Fifty-one factors were the main failure factors, divided into four main components (leadership, management system, external forces, and project resources). The Relatively Important Index (RII) is used to determine the relative importance factors and obtain the top tw

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering Science And Technology
Membrane Fouling Reduction for Reverse Osmosis System Using Zeta Rod
...Show More Authors

Reverse osmosis membrane desalination is one of the most significant water treatments that is used to offer freshwater. The aim of this research is to study the effect of controlling the value of the zeta potential on the suspended particles in the water and the proximity of the membrane surfaces in the colloidal solution, to keep the water stable electrically and disperse the colloidal particles. To achieve this aim, the experimental study was conducted in the Sanitary Engineering Laboratory, in the engineering college - University of Baghdad. Two systems were set up, one worked normally and the other worked by using the zeta rod placed before the reverse osmosis membrane. The results showed that the effect of the zeta rod increas

... Show More
Publication Date
Mon Nov 03 2008
Journal Name
All Days
Correlations for Optimum Separation Pressures for Sequential Field Separation System
...Show More Authors
ABSRACT<p>A study has been done to find the optimum separators pressures of separation stations. Stage separation of oil and gas is accomplished with a series of separators operating at sequentially reduced pressures. Liquid discharged from a higher pressure separator into the lower pressure separator. The set of working separators pressures which yield maximum recovery of liquid hydrocarbon from the well fluid is the optimum set of pressures which is the target of this work.</p><p>Computer model is used to find the optimum separators pressures. The model employs the Peng-Robinson equation of state for volatile oil. Application of this model shows good improvement of al</p> ... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Unity Sliding Mode Controller Design for Active Magnetic Bearings System
...Show More Authors

Active Magnetic Bearings (AMBs) are progressively being implemented in a wide variety of applications. Their exclusive appealing features make them suitable for solving traditional rotor-bearing problems using novel design approaches for rotating machinery.  In this paper, a linearized uncertain model of AMBs is utilized to develop a nonlinear sliding mode controller based on Lyapunov function for the electromechanical system. The controller requires measurements of the rotor displacements and their derivatives. Since the control law is discontinuous, the proposed controller can achieve a finite time regulation but with the drawback of the chattering problem. To reduce the effect of this problem, the gain of the uni

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Intelligent System for Parasitized Malaria Infection Detection Using Local Descriptors
...Show More Authors

Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus