Preferred Language
Articles
/
jeasiq-2155
Evaluation of the reality of applying a number of Iraqi institutional accreditation standards/study in a number of Iraqi public and private universities
...Show More Authors

     The study aims to find out the extent to which several Iraqi institutional accreditation standards (governance and administration, scientific research, curricula) are applied in two public universities (Baghdad and Middle Technical University) and two private universities (Uruk and Al-Mansour College) by diagnosing strengths and weaknesses and proposing a mechanism and procedures to help educational institution aims to reduce or eliminate the gap. The study stems from the extent of application of several Iraqi institutional accreditation standards represented as it was worked on through observation and field coexistence to reach scientific and practical facts. The method of case study and comparison between public and private universities was adopted by using the checklist as a tool to collect data and information to help in a comprehensive and realistic analysis.  The study reached a set of results, the most prominent of which is the weak interest of the universities in the study sample in implementing the Iraqi institutional accreditation standards, which showed a gap between the actual performance of the universities and the indicators of the standards. This indicates that there are no specialized audit teams in the field of auditing quality management systems in higher education qualified according to the international standard (ISO 19001) to know the extent of conformity, as well as the absence of targeted plans to implement the indicators of those standards. Despite the existence of a Quality Assurance and Accreditation Council at the university that oversees the application of quality management systems in all university formations, it needs to intensify efforts to reach reliability in providing its services

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 03 2023
Journal Name
Iraqi Journal Of Science
Face Recognition Using Stationary wavelet transform and Neural Network with Support Vector Machine
...Show More Authors

Face recognition is a type of biometric software application that can identify a specific
individual in a digital image by analyzing and comparing patterns. It is the process of
identifying an individual using their facial features and expressions.
In this paper we proposed a face recognition system using Stationary Wavelet Transform
(SWT) with Neural Network, the SWT are applied into five levels for feature facial
extraction with probabilistic Neural Network (PNN) , the system produced good results
and then we improved the system by using two manner in Neural Network (PNN) and
Support Vector Machine(SVM) so we find that the system performance is more better
after using SVM where the result shows the performance o

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
On Fully Stable Banach Algebra Modules and Fully Pesudo Stable Banach Algebra Modules
...Show More Authors

The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Genetic Algorithm-Based Anisotropic Diffusion Filter and Clustering Algorithms for Thyroid Tumor Detection
...Show More Authors

Medical imaging is a technique that has been used for diagnosis and treatment of a large number of diseases. Therefore it has become necessary to conduct a good image processing to extract the finest desired result and information. In this study, genetic algorithm (GA)-based clustering technique (K-means and Fuzzy C Means (FCM)) were used to segment thyroid Computed Tomography (CT) images to an extraction thyroid tumor. Traditional GA, K-means and FCM algorithms were applied separately on the original images and on the enhanced image with Anisotropic Diffusion Filter (ADF). The resulting cluster centers from K-means and FCM were used as the initial population in GA for the implementation of GAK-Mean and GAFCM. Jaccard index was used to s

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Management Science Letters
Work-life balance and its impact on employee satisfaction on five star hotels
...Show More Authors

This study aimed to find out the impact of work-life balance on employee satisfaction in five-star hotels in Amman, Jordan based on a descriptive analytical approach. The questionnaire of the survey was designed and distributed to a sample of participants in order to collect the necessary data for this study and they were analyzed later through the SPSS V22 program. The study population was the hotel sector in Jordan, while the study sample included the five-star hotels in the capital, Amman, and the sampling unit included the employees of the middle and lower levels of management in the five-star hotels in Amman. The study showed a number of results, including the existence of a good level of work-life balance by employees in top manage-me

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Splitting the one-Dimensional Wave Equation, Part II: Additional Data are Given by an End Displacement Measurement
...Show More Authors

     In this research, an unknown space-dependent force function in the wave equation is studied. This is a natural continuation of [1] and chapter 2 of [2] and [3], where the finite difference method (FDM)/boundary element method (BEM), with the separation of variables method, were considered. Additional data are given by the one end displacement measurement. Moreover, it is a continuation of [3], with exchanging the boundary condition, where  are extra data, by the initial condition. This is an ill-posed inverse force problem for linear hyperbolic equation. Therefore, in order to stabilize the solution, a zeroth-order Tikhonov regularization method is provided. To assess the accuracy, the minimum error between

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jul 22 2018
Journal Name
New Journal Of Chemistry
Jahn–teller distortion in 2-pyridyl-(1, 2, 3)-triazole-containing copper (II) compounds
...Show More Authors

The syntheses, characterization and experimental solid state X-ray structures of five low-spin paramagnetic 2-pyridyl-(1,2,3)-triazole-copper compounds, [Cu(Ln)2Cl2], are presented in this study, for the following five Ln ligands: L1 = 2-(1-(p-tolyl)-1H-(1,2,3-triazol-4-yl)pyridine), L2 = 2-(1-(4- chlorophenyl)-1H-(1,2,3-triazol-4-yl)pyridine), L3 = 4-(4-(pyridin-2-yl)-1H-(1,2,3-triazol-4-yl)benzonitril), L4 = 2-(1-phenyl-1H-(1,2,3-triazol-4-yl)pyridine) and L5 = 2-(1-(4-(trifluoromethyl)phenyl)-1H-(1,2,3- triazol-4-yl)pyridine). These five [Cu(Ln)2Cl2] complexes each contain two bidentate 2-pyridyl-(1,2,3)- triazole (Ln) and two chloride ions as ligands, with the Cu–N(pyridine) bonds, Cu–N(triazole) and Cu–Cl bonds trans to each othe

... Show More
Publication Date
Mon Dec 14 2020
Journal Name
Baghdad Science Journal
Smart Flow Steering Agent for End-to-End Delay Improvement in Software-Defined Networks
...Show More Authors

View Publication
Crossref (1)
Crossref