Preferred Language
Articles
/
jeasiq-1454
Evoluation of service system in the general eduction Baghdad hospital using Q GERT
...Show More Authors

That the essential contribution of this research is a description of how complex systems analysis service of the properties of the queue in Baghdad Teaching Hospital using a technique network is techniques method (Q - GERT) an acronym of the words:

Queuing theory _ Graphical Evaluation and Review Technique

Any method of assessment and review chart where you will be see the movement flow of patients within the system and after using this portal will be represented system in the form of planned network probabilistic analysis and knowledge of statistical distributions appropriate for times of arrival and departure were using the program ready (Win QSB) and simulation data collected directly from (9) Section service-hospital time two-hour no (120) minutes during peak time of time (12 - 10) at noon, for the purpose of data analysis and knowledge of statistical distributions appropriate has been used statistical program ready (STATGRAPHICS PLUS 4.0) was tested data in the same program testing (Good ness of fit), and after analyzing the data it was concluded that the best distribution of arrival times was normal distribution (Normal distribution) and the best distribution for times departure was distributed gamma (Gamma distribution) and all sections except sections of registration and pharmacy using normal distribution of times of arrival and departure , where system will be built on a queuing network of nodes and branches, through which we will get to hold a wait and we process these nodes develop solutions that lead to the solution of the constraints resulting impact of suffocation caused by waiting .   

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Thermodynamic and Kinetic Study of the Adsorption of Pb (II) from Aqueous Solution Using Bentonite and Activated Carbon
...Show More Authors

The adsorption of Pb(II) ions onto bentonite and activated carbon was investigated. The effects of pH, initial adsorbent dosage, contact time and temperature were studied in batch experiments. The maximum adsorption capacities for bentonite and activated carbon were 0.0364 and 0.015 mg/mg, respectively. Thermodynamic parameters such as Gibbs free energy change, Enthalpy change and Entropy change have been calculated. These thermodynamic parameters indicated that the adsorption process was thermodynamically spontaneous under natural conditions and the adsorption was endothermic in nature. Experimental data were also tested in terms of adsorption kinetics, the results showed that the adsorption processes followed well pseudo second- order

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 21 2018
Journal Name
Al-kindy College Medical Journal
Evaluation of the clinical examination in thediagnosis of acute medial collateral ligament injury of the knee joint in comparism with examination under general anesthesia
...Show More Authors

Background: Tear of MCL of the knee is a frequent problem among knee ligaments injuries.Injuries to the MCL are usually caused by contact on the outside of the knee and are accompanied by sharp pain on the inside of the knee. Contrary to most other knee ligaments the medial collateral ligament (MCL) has an excellent ability to heal, being fairly large and well vascularised structure. The vast majority of isolated medial ligament injuries heal without significant long-term problems

Objectives: is to compare between the early clinical examination, and assessment under general anesthesia (GA), and to find out the best methods to assess the MCL tear especially in suspected cases.

Type

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Knowledge Management and Developing Human Resources in the Secretariat of the Central Library- Baghdad University
...Show More Authors

Knowledge management contribute to the overall private university libraries to develop libraries for the purpose of creating human and technological resources by investing research and development, as well as education and training for life.
This study followed the methodology of the descriptive and historical pillars of knowledge management for the years 1990 to the present day in 2017, depending on statistical figures obtained by the researchers from the General Secretariat of the Central Library at the University of Baghdad, and the Human Resources Division, which specialized human resources training after 2004 (and before those years from 1982 until 2002, where the continuing education was committee of the fixed committees are wor

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Employ of Public Relations in Building Awareness of Security against Terrorism A Survey of the Employees of the Directorate General of Public Relations and Media at the Ministry of Interior
...Show More Authors

This study aims at identifying the role played by Public Relations in the field of security awareness of the dangers of terrorism. The research is directed to the employees at the Directorate General of Public Relations and Media at the Ministry of Interior. And that on the basis that those who play an important role in the security awareness are the security institutions, primarily the Ministry of Interior, since this Directorate is responsible for all subjects related to the public security using public relations science. It aims at identifying the functions, methods and communication tools used by the Directorate to raise awareness about the dangers of terrorism. In order to achieve the research objectives, the researcher uses the sur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 05 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATION OF CHEMICAL AND MICROBIAL QUALITY FOR SOME BOTTLED WATER THAT AVAIABLE IN LOCAL MARKETS: EVALUATION OF CHEMICAL AND MICROBIAL QUALITY FOR SOME BOTTLED WATER THAT AVAIABLE IN LOCAL MARKETS
...Show More Authors

This study was conducted to evaluate the bottled water quality for the six-producing companies in Baghdad city, where selected six brands which are the most marketed in the Iraqi market, especially in Baghdad, where taking the proper amount of bottled water in September 2015 and included the studied characteristics (EC , pH ,TDS, Turbidity, Ca+2, Mg+2, Cl-, No3-, So4-2, HCO3-, Na+ and K+) in addition to the total population of bacteria aerobic and coliform, and compare the results with the standard specifications of the Iraqi and the World Health Organization (WHO), as well as to compare the results of sampling specifications mentioned on the packaging by the producing companies. The results showed the presence of high significant differ

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation of the actual reality of supply chain operations in Noor Al-Kafeel Food Products Company/ case study.
...Show More Authors

Abstract:

                This research aims to identify the actual reality of the supply chain processes applied in the Noor Al-Kafeel Food Products Company, which was chosen as a research sample by measuring the application and documentation gap. The current research relies on the case study method to reach the desired results, and the seven-scale scale was relied on to identify the reality of the supply chain operations applied in the researched company and the use of quantitative and qualitative methods in data collection and analysis, as quantitative methods such as the arithmetic mean were used weighted, percentage measurement, and g

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Drilling of FR-4 Composite Materials Using Single Pulse of Nd:YAG Laser
...Show More Authors

Laser drilling is capable of producing small, precisely positioned holes with high degree of reproductively. In this paper , IR millisecond Nd:YAG single pulsed laser was used to determine the effect of laser parameters on the drilled hole of the glass - fiber reinforced epoxy composite FR-4 sample of 2 mm in thickness . The type of laser source was GSI lumonics JK760TR Series laser 1.064μm system in a CNC cabin. The JK760TR series has a 0.3-50ms pulse length and a maximum repetition rate 500Hz with an average power of 600W. The investigation of single pulse laser drilling in this paper was based on theoretical and experimental solutions. In single pulse technique, the investigation included focal plane position fpp, pulse shap

... Show More
View Publication Preview PDF