Preferred Language
Articles
/
jeasiq-1879
Using Project Management Maturity Model to Evaluate Construction Sector -Organizations. Case Study at the Department of buildings - Karkh first
...Show More Authors

The education sector suffers from many problems, including the scarcity of schools that can absorb the increasing number of students in light of the increasing population growth rate, as some regions suffer from a lack of opening of new schools or the expansion of existing schools to increase their capacity so that attention is required. The research sought to identify the level of maturity of project management at the research site (Building Department in Al-Karkh I/ Ministry of Education) Being responsible for educational projects and their implementation and to know that, the ten areas of the knowledge guide to project management PMBOK have been adopted according to the PM3 model (one of the models of maturity of project management), because of the importance of projects provided by the department of school buildings, especially in the field of education, and that the implementation of projects at a high level of maturity, provides a benefit to a wide range of citizens, the research aims to determine the maturity level of each project department at the site of the research and to find out the most influential reasons and find the necessary solutions to address the decline in the level of maturity of project management. Adopted in this research the method of case study being the most appropriate to achieve the objectives of the research as well as the advantages of this approach of combining more than one method in one, the list of examination was used to determine the level of maturity of the administration and then determine the causes of it according to the scheme of cause and effect and address the causes through the scheme of the impact of the solution, and has  The research reached a number of conclusions, the most important of which was the weakness of the departments for advance planning, such as the lack of a special number of divisions in the administration of the project, and a very high neglect of the department for human resources management, the required skills for the project are not identified, and no individual skills are adopted to enhance performance, and accordingly the research suggests using comprehensive quality tools to diagnose the causes of low maturity of project management and treatment in educational and educational institutions to reduce time, effort, cost and ease Application, and training in the organization the site of research on the use and practice of these tools by individuals.                                                                                                                      

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 15 2023
Journal Name
Iraqi Journal Of Science
Air Quality Over Baghdad City Using Ground and Aircraft Measurements.
...Show More Authors

In this paper, the air pollutants concentrations measurements such as Total
Suspended Particles(TSP), Carbon Monoxides(CO),Carbon Dioxide (CO2) and
meteorological parameters including temperature (T), relative humidity (RH) and
wind speed & direction were conducted in Baghdad city by several stations
measuring numbered (22) stations located in different regions, and were classified
into (industrial, commercial and residential) stations. The results show that the
concentrations of pollutants (TSP, CO, and CO2) have exceeded the air quality
standards set by World Health Organization (WHO) and Iraqi limitation in the
stations of the Baghdad city. The program (ArcGIS) used to prepare maps of air
pollution in Ba

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Data Mining Methods for Extracting Rumors Using Social Analysis Tools
...Show More Authors

       Rumors are typically described as remarks whose true value is unknown. A rumor on social media has the potential to spread erroneous information to a large group of individuals. Those false facts will influence decision-making in a variety of societies. In online social media, where enormous amounts of information are simply distributed over a large network of sources with unverified authority, detecting rumors is critical. This research proposes that rumor detection be done using Natural Language Processing (NLP) tools as well as six distinct Machine Learning (ML) methods (Nave Bayes (NB), random forest (RF), K-nearest neighbor (KNN), Logistic Regression (LR), Stochastic Gradient Descent (SGD) and Decision Tree (

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Image Watermarking using Integer Wavelet Transform and Discrete Cosine Transform
...Show More Authors

In the current research work, a system of hiding a text in a digital grayscale image has been presented. The algorithm system that had been used was adopted two transforms Integer Wavelet transform and Discrete Cosine transformed. Huffman's code has been used to encoding the text before the embedding it in the cover image in the HL sub band. Peak Signal to Noise Ratio (PSNR) was used to measure the effect of embedding text in the watermarked image; also correlation coefficient has been used to measure the ratio of the recovered text after applying an attack on the watermarked image and we get a good result. The implementation of our proposed Algorithm is realized using MATLAB version 2010a.

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Sustainble hot mix asphalt using recycled soft drink glass bottles
...Show More Authors

Rapid population growth and the development of industries result in an increase in solid waste. Glass, which represents a large proportion of solid waste, can be used in construction applications. The utilization of recycled glass waste in the asphalt mixture is considered an environmentally-friendly application. In this laboratory study, glass bottles were recycled by crushing, grinding, and sieving them into particles that pass through sieve No. 200 to be used as a partial replacement for the filler in the hot mixture asphalt of wearing course Type-A. The ratios (4, 4.3, 4.6, 4.9, 5.2,5.5) were used to determine the optimum asphalt content (OAC), and three ratios (30, 60, and 90) were used for the replacement of limestone powder filler to

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Monitoring Vegetation Area in Baghdad Using Normalized Difference Vegetation Index
...Show More Authors

       Vegetation monitoring is considered an important application in remote sensing task due to variation of vegetation types and their distribution. The vegetation concentration around the Earth is increase in 5% in 2000 according to NASA monitoring. This increase is due to the Indian vegetable programs. In this research, the vegetation monitoring in Baghdad city was done using Normalized Difference Vegetation Index (NDVI) for temporal Landsat satellite images (Landsat 5 TM& Landsat 8 OIL). These images had been used and utilize in different times during the period from 2000, 2010, 2015 & 2017. The outcomes of the study demonstrate that a change in the vegetation Cover (VC) in Baghdad city. (NDVI) generally shows a

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Text-based Steganography using Huffman Compression and AES Encryption Algorithm
...Show More Authors

In every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs  provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Spatiotemporal Drought Monitoring Using Remote Sensing Technique in Babel-Iraq
...Show More Authors

       Drought is one of the most natural hazards that may harm human life and property under different weather and environmental conditions. This study used remote sensing data to monitor agricultural and meteorological drought in Babel Governorate. Drought maps were drawn using Landsat 8 images based on Normalized Difference Vegetation Index (NDVI) for 2015, 2018, and 2021. The meteorological drought was assessed using a standardized precipitation index (SPI 12) for the same years. The results showed that the SPI-12 indicated near-normal drought types in 2015 and 2018, whereas SPI values showed a lower value in 2021. Two drought categories were identified which were moderate drought and severe drought. The NDVI results showed tha

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Solving Linear and Nonlinear Fractional Differential Equations Using Bees Algorithm
...Show More Authors

A numerical algorithm for solving linear and non-linear fractional differential equations is proposed based on the Bees algorithm and Chebyshev polynomials. The proposed algorithm was applied to a set of numerical examples. Faster results are obtained compared to the wavelet methods.

View Publication Preview PDF
Scopus (1)
Scopus Crossref