Preferred Language
Articles
/
jeasiq-1527
Openness Management by Figures as a Model of Integrity and Transparency
...Show More Authors

Competitive advantage is a substantial  strategic objective for organizations. It requires high levels in the quality of products and services provided to customers, continuous improvement of costing , care for creativity and innovative employees, and speed unique to the marketing and financial engineering, and business re-engineering processes. The situation in this area, requires actors to attract and develop human resources, including help in proper implementation of the strategic tasks that targeted by those institutions. According to the opinions and viewpoints of management scholars, the competitive advantage resource is the most important issue for organizations in the third millennium, which can be achieved through the construction of organizational knowledge, human capital, and their development to serve in transforming them into the learning and expert organizations, to know how to accelerate to be more efficient and flexible in the market.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhancing Drilling Parameters in Majnoon Oilfield
...Show More Authors

The objective of drilling parameters optimization in Majnoon oilfield is to arrive for a methodology that considers the past drilling data for five directional wells at 35 degree of inclination as a baseline for new wells to be drilled. Also, to predicts drilling performance by selecting the applied drilling parameters generated the highest rate of penetration (ROP) at each section. The focal point of the optimization process is to reduce drilling time and associated cost per each well. The results of this study show that the maximum ROP could not be achieved without sufficient flow rate to cool and clean the bit in clay intervals (36" and 24") hole sections. Although the influence of combination of Weight on Bit (WOB), Round per minute

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Annealing Effect on the phase Transformation in
...Show More Authors

This work describes the effect of temperature on the phase transformation of titanium dioxide (TiO2) prepared using metal organic precursors as starting materials. X-ray diffraction (XRD) was used to investigate the structural properties of TiO2 gels calcined at different temperatures (300, 500, 700) ?C. the results showed that the samples have typical peaks of TiO2 polycrystalline brookite nanopowders after calcined at (300 ?C), which confirmed by (111), (121), (200), (012), (131), (220), (040), (231), (132) and (232) diffraction peaks. Also, XRD diffraction spectra showed the presence of crystallites of anatase with low proportion of rutile phase where calcined at (500 ?C), while rutile phase domains at (700 ?C). The crystallite size of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Engineering
Roller compacted concrete: Literature review
...Show More Authors

Roller compacted concrete (RCC) is a material with no slumps and is made from the same raw materials as conventional concrete. The roller compacted dam method, the high paste technique, the corps of engineers method, and the maximum density method are all ways of designing RCC. The evolution of RCC has resulted in a substantial change in construction projects, most notably in dams, because of the sluggish pace of conventional placement, consolidation, and compacting. The construction process was accelerated by incorporating RCC into dams, resulting in a shorter construction period. Research shows that the dams that used RCC had completed one to two years sooner than the dams that used regular concrete (Bagheri an

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sat Jul 26 2025
Journal Name
Al–bahith Al–a'alami
The Responsibility of the Iraqi Journalism in Promoting Political Culture in Society: (An Analytical Study in Newspapers: Al-Sabah, Al-Ittihad, Al-Aalam for 2/ 3/ 2013 - 31/ 3/ 2013)
...Show More Authors

 

This study comes as: The responsibility of the Iraqi newspapers in promoting  the political culture inside society, an analytical study in newspapers: Al-Sabah, Al-Ittihad, Al-Aalam for 2/ 3/ 2013 to 31/ 3/ 2013 to spot light on the extent to which the three mentioned newspapers are compliance with the promotion  of the political culture inside society which is seen as one of the essential requirements for the success and promotion of the democratic process inside society.

The study aims to: finding out the extent to which these newspapers are compliance with their responsibility in the promoting the political culture inside society; knowing the nature of their role in pr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Samarra Journal Of Engineering Science And Research
Proposed low Xilinx FPGA power consumption for recursive NOMA applied in optical visible light communication
...Show More Authors

Today the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The po

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Energy Calculation for Excited Lithium Atom in Position Space
...Show More Authors

The energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Viable Strategies to Increase Clinical Trial Patient Diversity
...Show More Authors

In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
The Iraqi Journal For Information And Documentation Studies
Improving students' cognitive abilities using modern technologies: an experimental study
...Show More Authors

The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 26 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More