Preferred Language
Articles
/
jeasiq-1330
Administration Diagnosis of quality of work life dimensions: A survey of a sample of employees of the Northern Gas Filling Company in Nynawa
...Show More Authors

The primary objective of the present  research is to diagnose the most mportant imensions of quality of work life in a sample of individuals working in the Northern Gas Filling Company in Nynawa. The study sample consisted of 140 employees of the Northern Region Filling Company in even ,Through a questionnaire prepared for this purpose. The study concluded that there are five main factors that are considered to be measure of the quality of working life and are based on their importance: Empowerment, organizational health, internal work environment, motivation, development and training of workers. The study recommended that the organization should payattention to these factors when working to adopt the quality of work life and work to provide it correctly. The basic contribution of the present study is to provide a classification of quality of life factors based on the opinions of the employees of the research society. This gives practical importance to the study as the organizations can benefit from its results in providing these factors and work to strengthen them because of their high impact on the quality of work life and as a A measure of the quality of working life.



Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 23 2020
Journal Name
2020 International Conference On Advanced Science And Engineering (icoase)
A Comparative Study Using LZW with Wavelet or DCT for Compressing Color Images
...Show More Authors

As a result of the significance of image compression in reducing the volume of data, the requirement for this compression permanently necessary; therefore, will be transferred more quickly using the communication channels and kept in less space in memory. In this study, an efficient compression system is suggested; it depends on using transform coding (Discrete Cosine Transform or bi-orthogonal (tap-9/7) wavelet transform) and LZW compression technique. The suggested scheme was applied to color and gray models then the transform coding is applied to decompose each color and gray sub-band individually. The quantization process is performed followed by LZW coding to compress the images. The suggested system was applied on a set of seven stand

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Pakistan Heart Journal
Workplace Violence and Nursing Job Performance at Pediatric Emergency Departments: A Comparative Study
...Show More Authors

Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Embedding a Digitized Watermark Upon Colored Image Using Wavelet Transform with Comparative Technique
...Show More Authors

A special methodology for adding a watermark for colored (RGB) image is formed and adding the wavelet transform as a tool during this paper. The watermark is added into two components. The primary one is by taking the key that contain associate eight range from (0...7) every range in it determines the actual bit position in specific component of canopy image. If that bit is analogous to the bit in watermark, (0) are hold on within the Least Significant Bit (LSB) of the watermarked image; otherwise (1) are hold on. The other is that it will add multiple secret keys victimization shift and rotate operations. The watermark is embedded redundantly over all extracted blocks in image to extend image protection. This embedding is completed with

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Mixed Spinel Co0.4Zn0.6Fe2O4 Ferrite Nanoparticles As a Magnetic Photocatalyst: Synthesis and Dye Degradation
...Show More Authors

        In this paper, mixed spinel Co0.4Zn0.6Fe2O4 ferrite was synthesized by microwave-assisted combustion method. Photocatalytic activity of the as-synthesized sample was investigated against methylene blue dye at room temperature at different exposure times (60-360 min.) under visible light. Phase impurity and surface morphology which are investigated with XRD analysis and field emission- scanning electron microscopy, indicate that a cubic spinel unit cell structure with a crystilite size and lattice constant are 22.5048nm and 8.37Å, respectively. The saturation magnetization exhibited directly from the hysteresis loop is (70.20emu/g). Optical properties for the investigated ferrite

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 02 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Study on Liqid- Liquid Etraction on Iron(III) With 2,5- Diphenyi Oxazole
...Show More Authors

A study on  liquid- liquid extraction  of Iron (III) in Benzene has  been made. The effect of different parameters such as type of medium and time of equilibration,  concentration  of metal  ion, type of organic  solvent,  and effect of cations on distribution ratio of Iron (III). Has been studies the stoichiometry   of  the  extracted  species  determined   using  slope  analysis method and found to be (M:L) (1 :3).

View Publication Preview PDF
Publication Date
Wed Sep 29 2021
Journal Name
Molecules
A Comprehensive Review for Groundwater Contamination and Remediation: Occurrence, Migration and Adsorption Modelling
...Show More Authors

The provision of safe water for people is a human right; historically, a major number of people depend on groundwater as a source of water for their needs, such as agricultural, industrial or human activities. Water resources have recently been affected by organic and/or inorganic contaminants as a result of population growth and increased anthropogenic activity, soil leaching and pollution. Water resource remediation has become a serious environmental concern, since it has a direct impact on many aspects of people’s lives. For decades, the pump-and-treat method has been considered the predominant treatment process for the remediation of contaminated groundwater with organic and inorganic contaminants. On the other side, this tech

... Show More
View Publication
Scopus (89)
Crossref (80)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advanced Mechatronic Systems (icamechs)
Hierarchical sliding mode control applied to a single-link flexible joint robot manipulator
...Show More Authors

Trajectory tracking and vibration suppression are essential objectives in a flexible joint manipulator control. The flexible joint manipulator is an under-actuated system, in which the number of control actions is less than the degree of freedom to be controlled. It is very challenging to control the underactuated nonlinear system with two degree of freedom. This paper presents a hierarchical sliding mode control (HSMC) for a rotary flexible joint manipulator (RFJM). Firstly, the rotary flexible joint manipulator is modeled by two subsystems. Secondly, the sliding surfaces for both subsystems are constructed. Finally, the control action is designed based on the Lyapunov function. Computer simulation results demonstrate the effectiveness of

... Show More
View Publication
Scopus (24)
Crossref (11)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref