Preferred Language
Articles
/
jeasiq-2016
Application of Multi-Objective Optimization on the basis of Ratio Analysis (MOORA) Method
...Show More Authors

The paper aims is to solve the problem of choosing the appropriate project from several service projects for the Iraqi Martyrs Foundation or arrange them according to the preference within the targeted criteria. this is done by using Multi-Criteria Decision Method (MCDM), which is the method of Multi-Objective Optimization by Ratios Analysis (MOORA) to measure the composite score of performance that each alternative gets and the maximum benefit accruing to the beneficiary and according to the criteria and weights that are calculated by the Analytic Hierarchy Process (AHP). The most important findings of the research and relying on expert opinion are to choose the second project as the best alternative and make an arrangement according to performance and the combined degree obtained by each alternative. The researchers also reached the possibility of applying the model to solve various problems (MCDM), especially in cases where it is Standards are conflicting in further research.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 20 2018
Journal Name
Iraqi Journal Of Agricultural Sciences
EFFECT OF FOLIAR APPLICATION WITH CALCIUM, MAGNESIUM AND FERTILIZING WITH HUMIC ACID ON GROWTH , YIELD, AND STORAGE ABILITY OF POTATO TUBERS.
...Show More Authors

Two experiments were carried out, the first at the College of Agriculture - University of Baghdad during spring season 2017 Everest cv. class (Elite) was used to study the effect of foliar application of calcium and magnesium and addition of humic acid to the soil on potato growth and yield, The layout of the experiment was factorial within RCBD design using three replicates. Calcium and Magnesium sprayed with concentrations (0, 500, 1000 mg.L-1), while the  humic acid was added to the soil with (0, 0.75 gm.m2),  The second experiment included  storage of tubers produced from the spring season, with to study the effect of field treatments  on improving the storability of the tubers. The results showed that the treatment of calci

... Show More
Scopus (10)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Predictors of poor first trimester outcome in asymptomatic women : the value of embryonic heart rate , mid sac diameter / yolk sac ratio & mid sac diameter / crown rump length
...Show More Authors

Background:  Ultrasound provides a powerful tool for assessing early pregnancy and detecting pregnancy failure at first trimester and promoting rapid effective management. Several  criteria have been established  to predict  the pregnancy outcome particularly in symptomatic women .

Aim: To evaluate  asymptomatic women at the first trimester of pregnancy , to assess the efficacy of certain ratios as mid sac diameter (MSD)  / yolk sac ratio & crown rump length (CRL)/mid sac diameter (as indicator  of early first trimester oligohydramnios)  in predicting poor 1st   trimester outcome

Type of the study: A cross-s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 27 2024
Journal Name
Epitheorese Klinikes Farmakologias Kai Farmakokinetikes – Greek Edition
Response surface optimization and in vitro study of nasal solusomes nanovesicles for the bioavailability improvement and brain targetting of sumatriptan
...Show More Authors

Background: One effective second-generation triptan for migraine attacks is sumatriptan. Following oral use, it has a 40% restricted bioavailability because of the first-pass metabolism. Aim: To develop the best intranasal Solusomes formula as a substitute that delivers into the brain directly, improving its bioavailability, and removing the first-pass outcome was the aim of this effort. Methodology: We developed solute formulations based on the Box-Behnken design and subsequently produced them via thin-film hydration. The quality by design technique was used to establish a correlation between the formulation parameters (Soluplus® and phosphatidylcholine (PC) concentrations) and signif¬icant quality powers (entrapment efficiency (

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
2019 4th Scientific International Conference Najaf (sicn)
Modeling and Experimental Research of Vibration N Properties of A Multi-Layer Printed Circuit Board
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Management And Social Perspectives
The Role of Green Target Costing in Improving Supplier Relations
...Show More Authors

This study aims to explain the role of green target costing technique in improving the relationship with suppliers in a sample of industrial companies listed on the Iraq Stock Exchange. The descriptive analytical approach was used, where a questionnaire was designed that included a set of questions that were directed to a sample of 84 individuals including production managers, finance managers, quality managers, and purchasing managers in these companies. The study uses some statistical analyzes such as correlation analysis and regression analysis to analyze the questionnaires. The study finds a positive impact of the green target costing technique on improving the relationship with suppliers. The results indicate that the relation

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
Exploring the Integration of Environmental Identity within EFL Teacher's Identity
...Show More Authors

Nowadays, the ideas of integrating the concepts of the environment and saving it are being famous. These ideas are widely seen in many fields of study, and language education is one of them. Thus, the identity of English Language teachers (ELT) is a step toward transferring this concept in EFL materials in ELT departments. The EFL teacher's identity takes different meanings. Sometimes, it only means the teacher who teaches the English language, and other times, it means, the cultural and social aspects that the teacher and students interact during the study course. These cultural and social aspects represent the environment in teacher’s identity. This study aims to explore the environmental identity within EFL teacher identity. The sam

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref