Preferred Language
Articles
/
jeasiq-1277
امكانية تكييف نظام الجودة في شركة الاسمنت العراقية وفقا لمتطلبات نموذج تاكيد الجودة iso9001 الخاص بنظام العمل والعاملين دراسة استطلاعية لاراء عينة من المديرين في الشركة
...Show More Authors

امكانية تكييف نظام الجودة في شركة الاسمنت العراقية وفقا لمتطلبات نموذج تاكيد الجودة iso9001 الخاص بنظام العمل والعاملين دراسة استطلاعية لاراء عينة من المديرين في الشركة

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
The Calculation and Analysis of the Total Electron Content Over Different Latitudes and Seasons Using the Numerical Trapezoidal and Simpson Methods
...Show More Authors

It has been shown in ionospheric research that calculation of the total electron content (TEC) is an important factor in global navigation system. In this study, TEC calculation was performed over Baghdad city, Iraq, using a combination of two numerical methods called composite Simpson and composite Trapezoidal methods. TEC was calculated using the line integral of the electron density derived from the International reference ionosphere IRI2012 and NeQuick2 models from 70 to 2000 km above the earth surface. The hour of the day and the day number of the year, R12, were chosen as inputs for the calculation techniques to take into account latitudinal, diurnal and seasonal variation of TEC. The results of latitudinal variation of TE

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Investigation of the Nuclear Structure of Some Ni and Zn Isotopes with Skyrme-Hartree-Fock Interaction
...Show More Authors

The inelastic C2 form factors and the charge density distribution (CDD) for 58,60,62Ni and 64,66,68Zn nuclei has been investigated by employing the Skyrme-Hartree-Fock method with (Sk35-Skzs*) parametrization. The inelastic C2 form factor is calculated by using the shape of Tassie and Bohr-Mottelson models with appropriate proton and neutron effective charges to account for the core-polarization effects contribution. The comparison of the predicted theoretical values was conducted with the available measured data for C2 and CDD form factors and showed very good agreement.

View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
Technique and music of letter poetry in Nali’s poetry: هونەر و مۆسیقای «پیتەشیعر» له شیعری نالیدا
...Show More Authors

Musicality is a fundamental feature of poetry that takes the interest of scholars and critics. Most poets rely on a variety of literary devices and techniques to bring music to their work like rhymes - words that appear at the end of lines in poetry - and on arranging words techniques in such a way to create a pseudo melody, which is achieved primarily by patterning (or repeating) certain sounds. Such a poetic rhetorical and verbal enhancer’s aspect represented ever since the beginning of the classical poetry has been manifested more evidently in Nali’s poetry. His poetry is marked with particular letters that have played a substantial role in the rhyming that rings like cymbals or jingle like internal elevated rhymes. Within a descr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 09 2021
Journal Name
Political Sciences Journal
Obstacles to reforming the Security Council and new international changes
...Show More Authors

The international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Synthesis AgO Nanoparticles by Nd:Yag Laser with Different Pulse Energies
...Show More Authors

     One technique used to prepare nanoparticles material is Pulsed Laser Ablation in Liquid (PLAL), Silver Oxide nanoparticles (AgO) were prepared by using  this technique, where silver target was submerged in ultra-pure water (UPW)  at room temperature after that Nd:Yag laser which characteristics by 1064 nm wavelength, Q-switched, and 6ns pulse duration was used to irradiated silver target. This preparation method was used to study the effects of laser irradiation on Nanoparticles synthesized by used varying laser pulse energy 1000 mJ, 500 mJ, and 100 mJ, with 500 pulses each time on the particle size. Nanoparticles are characterized using XRD, SEM, AFM, and UV-Visible spectroscopy. All the structural peaks determined by the XRD

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
Fitting Scoring Rubrics for Electronic Portfolio to Partial Credit Model According to the Number of Assumed Dimensions
...Show More Authors

Abstract

 

The current research aims to reveal the extent to which all scoring rubrics data for the electronic work file conform to the partial estimation model according to the number of assumed dimensions. The study sample consisted of (356) female students. The study concluded that the list with the one-dimensional assumption is more appropriate than the multi-dimensional assumption, The current research recommends preparing unified correction rules for the different methods of performance evaluation in the basic courses. It also suggests the importance of conducting studies aimed at examining the appropriateness of different evaluation methods for models of response theory to the

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Fractographic Analysis of Tensile Failures of Zirconia Epoxy Nanocomposites
...Show More Authors

This work characterizes the fractographic features of the neat epoxy and ZrO2 epoxy nanocomposites. All samples were subjected to a tensile test to determine the tensile strength and tensile modulus. SEM images were used to study the morphology of the fractured surface. The fractographic of the fracture surfaces were studied by microstructure analysis program (j-images) to specify the effect of ZrO2 nanoparticles on tensile performance and failure mechanism for ZrO2 epoxy nanocomposites. The tensile test results show that the addition of ZrO2 nanoparticles (2, 4, 6, 8, and 10 vol.%) to the epoxy matrix leads to increase the tensile strength about 40% for optimal content of ZrO2 nanop

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref