Preferred Language
Articles
/
jeasiq-248
Assessing Service Quality using Data Envelopment analysis Case study at the Iraqi Middle East Investment Bank
...Show More Authors

The use of data envelopment analysis method helps to improve the performance of organizations in order to exploit their resources efficiently in order to improve the service quality. represented study a problem in need of the Iraqi Middle East Investment Bank to assess the performance of bank branches, according to the service quality provided, Thus, the importance of the study is to contribute using a scientific and systematic method by applying  the data envelopment analysis method in assessing the service quality provided by the bank branches, The study focused on achieving the goal of determining the efficiency of the  services quality provided by the bank branches manner which reflect the extent of utilization of available resources, which were represented by (number of managers, number of employees, number of savings accounts, number of current accounts, number of credit accounts) to improve the service quality that have been measured according to the dimensions of (tangibility, reliability, responsiveness, Assurance, empathy). The study was applied in number of  branches in Baghdad city, which included branches (AL-Raaesie, tabark, alnoman, alzahir, altqdm, almstqbl, alnjah and alghoson), has confirmed the results of the study to achieve high efficiency of the  service quality for A number of bank branches, through the utilization of resources in an efficient, and therefore the study recommends using data envelopment analysis to assessing of service quality at All branches of the bank

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Journal Of Engineering
Prediction of Shear Strength Parameters of Gypseous Soil using Artificial Neural Networks
...Show More Authors

The shear strength of soil is one of the most important soil properties that should be identified before any foundation design. The presence of gypseous soil exacerbates foundation problems. In this research, an approach to forecasting shear strength parameters of gypseous soils based on basic soil properties was created using Artificial Neural Networks. Two models were built to forecast the cohesion and the angle of internal friction. Nine basic soil properties were used as inputs to both models for they were considered to have the most significant impact on soil shear strength, namely: depth, gypsum content, passing sieve no.200, liquid limit, plastic limit, plasticity index, water content, dry unit weight, and initial

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Linear Boundary Value Problem Using Shooting Continuous Explicit Runge-Kutta Method
...Show More Authors

  In this paper we shall generalize fifth explicit Runge-Kutta Feldberg(ERKF(5)) and Continuous explicit Runge-Kutta (CERK) method using shooting method to solve second order boundary value problem  which can be reduced to order one.These methods we shall call them as shooting Continuous Explicit Runge-Kutta method, the results are computed using matlab program.

View Publication Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Image Compression Using Tap 9/7 Wavelet Transform and Quadtree Coding Scheme
...Show More Authors

This paper is concerned with the design and implementation of an image compression method based on biorthogonal tap-9/7 discrete wavelet transform (DWT) and quadtree coding method. As a first step the color correlation is handled using YUV color representation instead of RGB. Then, the chromatic sub-bands are downsampled, and the data of each color band is transformed using wavelet transform. The produced wavelet sub-bands are quantized using hierarchal scalar quantization method. The detail quantized coefficient is coded using quadtree coding followed by Lempel-Ziv-Welch (LZW) encoding. While the approximation coefficients are coded using delta coding followed by LZW encoding. The test results indicated that the compression results are com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 14 2015
Journal Name
International Journal Of Computer Applications
Performance Evaluation of Zigbee Routing Protocol under Various Conditions using OPNET Modeler
...Show More Authors

Zigbee, which has the standard IEEE 802.15.4. It is advisable method to build wireless personal area network (WPAN) which demands a low power consumption that can be produced by Zigbee technique. Our paper gives measuring efficiency of Zigbee involving the Physical Layer (PL) and Media Access Control (MAC) sub-layer , which allow a simple interaction between the sensors. We model and simulate two different scenarios, in the first one, we tested the topological characteristics and performance of the IEEE802.15.4 standard in terms of throughput, node to node delay and figure of routers for three network layouts (Star, Mesh and Cluster Tree) using OPNET simulator. The second scenario investigates the self-healing feature on a mesh

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Design of an Electron Gun Using two Electrod Low Aberration Immersion Lens
...Show More Authors

Abstract
A two electrode immersion electrostatic lens used in the design
of an electron gun, with small aberration, has been designed using
the finite element method (FEM). By choosing the appropriate
geometrical shape of there electrodes the potential V(r,z) and the
axial potential distribution have been computed using the FEM to
solve Laplace's equation.
The trajectory of the electron beam and the optical properties of
this lens combination of electrodes have been computed under
different magnification conditions (Zero and infinite magnification
conditions) from studying the properties of the designed electron
gun can be supplied with Abeam current of 5.7*10-6 A , electron
gun with half acceptance

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Seroprevalence of Toxoplasma gondii in Schizophrenic Patients in Iraq using ELISA test
...Show More Authors

Toxoplasmosis is a widespread infection of great importance, and that the disease does not show any clinical specific signs . this study was performed on 200 patients with schizophrenia were collected from :Al-Rashad Teaching Hospitals and 100 healthy individuals, considered as control group, the samples were collected during the period of December 2012 until the end of February, 2013. Antibodies against T. gondii parasite in the serum were detected by using latex agglutination test (LAT) and showed a percentage of positive antibodies in schizophrenic patients and healthy individuals (control) 143(71.5%) and 45( 45%) respectively.While using Enzyme Linked Immunosorbent Assay (ELISA) the positive blood sera in LAT test of the schizophreni

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Multiple Mixing Ratios of Gamma Rays From Reaction Using a2-ratio Method
...Show More Authors

The -multiple mixing ratios of γ-transitions from levels of populated in the are calculated in the present work by using the a2-ratio methods. We used the experimental coefficient (a2) for two γ-transitions from the same initial state, the statistical tensor, which is related to the a2-coefficient would be the same for the two transitions. This method was used in a previous work for pure transitions or which can be considered pure. In these cases the multiple mixing ratios for the second transition ( ) equal zero, but in our work we applied this method for mixed γ-transitions and then the multiple mixing ratio ( ) is known for one transition. Then we calculate the ( ) value and versareversa. The weight average of the -values calcu

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees21gr
Simulation and evaluation of elliptical hyperboloid solar concentrator by using Zemax program
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Measurement of Radioactivity in Some Commercial Porcelain Samples by Using HPGe Detector
...Show More Authors

     Estimations of specific activity concentrations in eight commercial porcelain tiles made in different countries were performed by the use of HPGe detector. We have found that the highest specific activity concentrations for 238U, 40K were equal to (21.120 Bq/kg) and (283.862 Bq/kg) respectively, Iranian origin, while the highest specific activity concentration for 232Th was found to be equal to (29.292 Bq/kg), Iraqi origin; all of which were less than their corresponding recommended values given by (UNSCEAR, 2000). The radiation hazard indices [IÉ£ , Hin ,Hex , Raeq ,DÆ” , (AEDE) in and (AEDE) out] w

... Show More
View Publication Preview PDF
Crossref (1)
Crossref