Preferred Language
Articles
/
jeasiq-112
The Mediator Role of Workplace Spirituality in The Relationship Between Psychological Capital and Entrepreneurial Behavior: Field Research in the center of the Iraqi Ministry of Oil
...Show More Authors

Abstract

      The research aims to identify the mediator role of  workplace spirituality in the  relationship between psychological capital and entrepreneurial  behavior: field research to a sample opinions from employees at the center of the Iraqi ministry of Oil . The importance of the current research emerged from paucity of studies that have attempted to identify and know the nature of the relationship between the variables as well as trying to find the current address and realistic problem directly affects the performance of employees in the Iraqi oil sector.

 In order to achieve the goal of research the use of the analytical method (quantitative) was relying on the questionnaire as an essential tool for collecting research data Has been chosen center of the Iraqi Ministry of Oil a field to search, included (307) Employees At all administrative levels in the Ministry.

     The evaluating and testing the Validity and Reliability of the measurement research tools we have been relying on test coefficient (Cronbach's alpha) as well as on the use of confirmatory  factor analysis  for variables research. Then we conducted data analysis and test hypotheses using appropriate statistical tools (some of descriptive statistics, Correlation analysis, direct and indirect effect analysis using the structural equation modeling method, and the Sobel test to verify the significance of the intermediate role assumptions.

    The results showed  correctness or validity of all the research hypotheses, Accordingly, a set of conclusions was formulated, the most important of which is that variable of the  workplace spirituality partially mediates the relationship between psychological capital and entrepreneurial behavior, The research concluded with a number of recommendations Which ensures a range of administrative mechanisms and practices that promote the building of psychological capital and create an environment conducive to the development of workplace spirituality and entrepreneurial behavior of employees.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Thickening Time and Compressive Strength Correlations for Bentonitic- Class "G" Cement Slurries
...Show More Authors

Empirical equations for estimating thickening time and compressive strength of bentonitic - class "G" cement slurries were derived as a function of water to cement ratio and apparent viscosity (for any ratios). How the presence of such an equations easily extract the thickening time and compressive strength values of the oil field saves time without reference to the untreated control laboratory tests such as pressurized consistometer for thickening time test and Hydraulic Cement Mortars including water bath ( 24 hours ) for compressive strength test those may have more than one day.

View Publication Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Using simulation to estimate parameters and reliability function for extreme value distribution
...Show More Authors

   This study includes Estimating scale parameter, location parameter  and reliability function  for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).

 Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Iraqi Journal Of Physics
Optical and structural study for DLC thin films prepared by plasma jet
...Show More Authors

Diamond-like carbon (DLC) homogeneous thin films were deposited from cyclohexane (Ccyclohexane (Ccyclohexane (Ccyclohexane (C cyclohexane (Ccyclohexane (Ccyclohexane (C cyclohexane (Ccyclohexane (C 6H12 ) liquid by using a plasma jet system which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with alternating high voltage 7.5 which operates with alternating high voltage 7.5which operates with al

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Aip Conference Proceedings
(𝓹,𝔼)-convex sets and (𝓹,𝔼)-Convex functions with their properties
...Show More Authors

View Publication
Crossref
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Ocean Engineering
Stresses and pore water pressure induced by machine foundation on saturated sand
...Show More Authors

In this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. In order to investigate the response of soil and footing to steady state dynamic loading, a physical model was manufactured. The manufactured physical model could be used to simulate steady state harmonic load at different operating frequencies. Total of (84) physical models were performed. The parameters that were taken into considerations include loading frequency, size of footing and different soil conditions. The footing parameters were related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were used (100 200 12.5 mm) and (200 400 5.0 mm).

... Show More
View Publication
Crossref (20)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
ON-Line MRI Image Selection and Tumor Classification using Artificial Neural Network
...Show More Authors

When soft tissue planning is important, usually, the Magnetic Resonance Imaging (MRI) is a medical imaging technique of selection. In this work, we show a modern method for automated diagnosis depending on a magnetic resonance images classification of the MRI. The presented technique has two main stages; features extraction and classification. We obtained the features corresponding to MRI images implementing Discrete Wavelet Transformation (DWT), inverse and forward, and textural properties, like rotation invariant texture features based on Gabor filtering, and evaluate the meaning of every

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Artificial Neural Network and Latent Semantic Analysis for Adverse Drug Reaction Detection
...Show More Authors

Adverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting AD

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (8)
Scopus Crossref