Abstract:
This research emerged due to the needs of Iraqi social sector for diagnosing the problems ,finding the appropriate solutions,and exploiting the social opportunities to solve these problems .The research problem focused on raising the following question: "Were Iraqi Managers in the Ministry of Labor and Social Affairs able to use their qualifications as social entrepreneurs in the ministry to improve the quality of life of the disadvantaged groups?", In light of that, the importance and objectives of the study were determined, and this research derives its importance from trying to address social problems by measuring the degree of meeting the subjective and objective needs of the customer to improve living, The research aims to achieve a number of objectives including access, Including the access to results that underpin the frame of research variables (social entrepreneurship, the quality of life of the customer) and formulating the hypotheses of correlation and influences of research variables. It is conducted a field study on ten social programs implemented in a number of departments of the Iraqi Ministry of Labor and Social Affairs in Baghdad governorate (Security of private sector employees, Social welfare, registration and employment of the unemployed, a national program for the control of occupational diseases, training of the unemployed, economic and social empowerment of women, support for small income-generating projects-loans, social housing for the elderly, full-time appointment, and Exemptions for people with disabilities and special needs), The community of research consists of the managers of these ten programs in the ministry. It chooses a random sample consists of (200) managers of these programs. This research is based on two approaches– descriptive approach in the theoretical side and the field study in the practical side for analyzing the questionnaire. the reality of the variables of the research were addressed and analyzed for the selected sample. Then, the hypotheses of correlation were tested by using correlation coefficient (Pearson). The hypotheses of influence were tested by using the approach of Structural Equation Modeling (SEM). A number of software such as Excel. V.2010, SPSS.V.24, and AMOS.V.24. were used for quantitatively analyzing data and finding the results. The results showed the validity of correlation and the influences hypotheses for the variables. The main recommendations focused on recruitment of individuals with experience and qualifications in the social entrepreneurship field consistent with Iraqi environment in order to improve the quality of life for customers (beneficiaries from the services of ministry).
In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
This study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreThis research is devoted to study the strengthening technique for the existing reinforced concrete beams using external post-tensioning. An analytical methodology is proposed to predict the value of the effective prestress force for the external tendons required to close cracks in existing beams. The external prestressing force required to close cracks in existing members is only a part from the total strengthening force.
A computer program created by Oukaili (1997) and developed by Alhawwassi (2008) to evaluate curvature and deflection for reinforced concrete beams or internally prestressed concrete beams is modified to evaluate the deflection and the stress of the external tendons for the externally strengthened beams using Matlab