In this paper, the researcher suggested using the Genetic algorithm method to estimate the parameters of the Wiener degradation process, where it is based on the Wiener process in order to estimate the reliability of high-efficiency products, due to the difficulty of estimating the reliability of them using traditional techniques that depend only on the failure times of products. Monte Carlo simulation has been applied for the purpose of proving the efficiency of the proposed method in estimating parameters; it was compared with the method of the maximum likelihood estimation. The results were that the Genetic algorithm method is the best based on the AMSE comparison criterion, then the reliability was estimated by an inverse Gaussian distribution according to the characteristics of the Wiener process. It was also applied based on real data taken from an experiment intended to determine the degradation in the light intensity of lamps under specific experimental conditions
The purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st
... Show MoreThis study aimed to identify the perceived mental image of volunteering, and its relationship to volunteer motivation among a sample of Al-Quds Open University students, as well as to identify the differences in the perceived mental image of volunteering due to variables (gender, year of study, place of residence, college). The researcher has used relational descriptive approach. The researcher has used two questionnaires, the first was used to measure the perceptive mental image of volunteering, and the second to measure the motivation towards volunteering, and the study population may consist of all students of Al-Quds Open University Hebron Branch during the first semester of the academic year 2021/2020 and their number (3462)Male and
... Show MoreThe recognition of the dynamic organizational capabilities in their actual and influential extent in the work environment achieves a set of positive data that can fall under the addition axes, particularly with regard to the organization's ability to manage human talents in them, so the researchers sought to identify the level of contribution of dynamic organizational capabilities in the management of human talents in terms of Keep them away in the research organization by indicating the level of relationship and impact between them. The presidency of Mosul University was chosen as a field for the current study, and data were collected by adopting the questionnaire form as the main tool for the study. The study used a deliberate
... Show MoreActual and effective organizational dynamic capabilities in the work environment contribute to a number of factors that contribute to the organization's ability to manage its human talents. Thus, the study sought to identify the level of contribution of organizational dynamic capabilities to human talent management based on their dimensions in the investigated organization by determining the level of relationship and impact between these variables. The presidency of Mosul University was chosen as a field for the current study, and data were collected by adopting the questionnaire form as the main tool for the study. The study used a deliberate sample of (42) administrative leaders in the investigated organization and adopte
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThe research aims at measuring the extent of the relationship and influence of the indicators of the Core competencies of the audit firms and offices in the Earning Quality of the private banks listed in the Iraq Stock Exchange under audit. The research community represents 38 banks. The sample of the research has been approved only 10 banks continue to issue their financial statements for the period (2007 – 2017), in addition to the audit offices assigned to audit these banks, which amounted to 14 companies and auditing offices. John's (1999) model revised by Kothari et al., (2005) was adopted to measure the Earning Quality by finding discretionary accruals and non-discretionary accruals, to measure the Core competencies indicators ,
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreThe current study aimed to measure the attitudes of female teachers towards the use of digital learning and the degree of possessing their digital education skills. The study sample consisted of (180) workers with disabilities (mental disability، auditory impairment، visual disability، hyperactivity and distraction. To achieve the goals of the study, the transformation measure was used towards digital education for people with disabilities. The study reached the following results: the availability of digital learning skills among workers with disabilities. The study concluded with a series of recommendations including holding Training courses to keep up with the challenges of educational trends and modern technology in this area.