The present study aims to explore determinants of entrepreneurial behavior from perspective of social theory. It is based on model notions of (Tyler & Blader, 2003) which have focused on studying role of positively personal and social identity in motivating employees to practicing desired behavior which serves the organization in which they work. Based on these notions and previous literature, study model were built. This model explains the relationship between status judgments (perceived internal respect and perceived external prestige) and entrepreneurial behavior. It includes three main hypotheses. The first and second hypothesis are concerning the relationship between status judgments and entrepreneurial behavior while the third hypothesis pays attention to test role of perceived external prestige as moderator variable for relationship between perceived internal respect and entrepreneurial behavior. Data collected from sample included three colleges of AL-Qadisiyah university which is consisted (152) employees. After extraction findings, number of meaningful conclusions and recommendations were formulated.
This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThis paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreKE Sharquie, SA Al-Mashhadani, AA Noaimi, WB Al-Zoubaidi, Our Dermatology Online/Nasza Dermatologia Online, 2015 - Cited by 10
In this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N
... Show MoreThis study aimed at some of the criteria used to determine the form of the river basins, and exposed the need to modify some of its limitations. In which, the generalization of the elongation and roundness ratio coefficient criterion was modified, which was set in a range between (0-1). This range goes beyond determining the form of the basin, which gives it an elongated or rounded feature, and the ratio has been modified by making it more detailed and accurate in giving the basin a specific form, not only a general characteristic. So, we reached a standard for each of the basins' forms regarding the results of the elongation and circularity ratios. Thus, circular is (1-0.8), and square is (between 0.8-0.6), the blade or oval form is (0.6-0
... Show MoreAbstract: The increased interest in developing new photonic devices that can support high data rates, high sensitivity and fast processing capabilities for all optical communications, motivates a pre stage pulse compressor research. The pre-stage research was based on cascading single mode fiber and polarization maintaining fiber to get pulse compression with compression factor of 1.105. The demand for obtaining more précised photonic devices; this work experimentally studied the behavior of Polarization maintaining fiber PMF that is sandwiched between two cascaded singe mode fiber SMF and fiber Bragg gratings FBG. Therefore; the introduced interferometer performed hybrid interference of both Mach-Zehnder
... Show MoreSeeking pharmacist advice about minor ailments is a common practice among Iraqi patients because such advice is free and quick. Unfortunately, the assessment and management of minor ailments by Iraqi pharmacists were inappropriate. Therefore, this study aimed to develop a model for a mobile application that can assist community pharmacists in the diagnosis and management of minor ailments.
The scientific content of the application was based on the information in the symptoms in the pharmacy and British Nati
In the present work, bentonite clay was used as an adsorbent for the removal of a new prepared mono azo dye, 4-[6-bromo benzothiazolyl azo] thymol (BTAT) using batch adsorption method. The effect of many factors like adsorption time, adsorbent weight, initial BTAT concentration and temperature has been studied. The equilibrium adsorption data was described using Langmuir and frundlich adsorption isotherm. Based on kinetics study, it was found that the adsorption process follow pseudo second order kinetics. Thermodynamics data such as Gibbes Free energy ∆Gᵒ, entropy ∆Sᵒ and ∆Hᵒ were also determined using Vant Hoff plot.
It is well known that drilling fluid is a key parameter for optimizing drilling operations, cleaning the hole, and managing the rig hydraulics and margins of surge and swab pressures. Although the experimental works represent valid and reliable results, they are expensive and time consuming. In contrast, continuous and regular determination of the rheological fluid properties can perform its essential functions during good construction. The aim of this study is to develop empirical models to estimate the drilling mud rheological properties of water-based fluids with less need for lab measurements. This study provides two predictive techniques, multiple regression analysis and artificial neural networks, to determine the rheological
... Show More