Preferred Language
Articles
/
jeasiq-433
Adoption of Membership Level for Critical Activities In Knowledge Chain Model Building An Investigation Analytical Study Depending on Fuzzy Logic Architecture for Organizations Pushed by Knowledge
...Show More Authors

Abstract

   The aim of this research is to concentrate on the of knowledge management activities, initial activities: (Acquisition, Selection, Generation, Assimilation, Emission) knowledge, and support activities: (Measurement, Control, Coordination, Leadership) that is manipulate and controlling in achieving knowledge management cases in organization, that’s is leads to  knowledge chain model, then determining the level of membership for these activities to knowledge chain model in a sample of Iraqi organization pushed by knowledge (Universities). The research depends on check list for gaining the data required, theses check list designed by apparently  in diagnosing research dimensions and measurement mechanism. In the field domain, the researchers adopted the Fuzzy Logic architecture in checking the initial and support activities and its membership. The researchers concluded that the determining the level of membership function for these activities for building the knowledge chain model in Mosul and Mustansiriyah universities. The researchers suggests to all Iraqi Managements and the management in pushed by knowledge organization about the necessity of perception of gap between (Theoretical- Field) domains in appliance the knowledge management by movement to dependence the program and modern quantitative methods in explanation the theoretical reality.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Photoacoustic Imaging for Tumor Detection: An in vitro Simulation Study
...Show More Authors

Photoacoustic is a unique imaging method that combines the absorption contrast of light or radio frequency waves with ultrasound resolution. When the deposition of this energy is sufficiently short, a thermo-elastic expansion takes place whereby acoustic waves are generated. These waves can be recorded and stored to construct an image. This work presents experimental procedure of laser photoacoustic two dimensional imaging to detect tumor embedded within normal tissue. The experimental work is accomplished using phantoms that are sandwiched from fish heart or blood sac (simulating a tumor) 1-14mm mean diameter embedded within chicken breast to simulate a real tissue. Nd: YAG laser of 1.064μm and 532nm wavelengths, 10ns pulse duration, 4

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Current Researches On Social Sciences
An Examination of Discourse Investigation of Fallacies in Religious Texts: Islam as a Case Study
...Show More Authors

BN RASHİD, 2023

View Publication
Publication Date
Thu Dec 24 2020
Journal Name
Advances In Civil Engineering
Analytical study on torsional behavior of concrete beams strengthened with fiber reinforced polymer laminates using softened truss model
...Show More Authors

This study aimed at evaluating the torsional capacity of reinforced concrete (RC) beams externally wrapped with fiber reinforced polymer (FRP) materials. An analytical model was described and used as a new computational procedure based on the softened truss model (STM) to predict the torsional behavior of RC beams strengthened with FRP. The proposed analytical model was validated with the existing experimental data for rectangular sections strengthened with FRP materials and considering torque-twist relationship and crack pattern at failure. The confined concrete behavior, in the case of FRP wrapping, was considered in the constitutive laws of concrete in the model. Then, an efficient algorithm was developed in MATLAB environment t

... Show More
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sun Apr 11 2021
Journal Name
Environment, Development And Sustainability
Developing a system for assessing the sustainability in school building projects
...Show More Authors

View Publication
Crossref (9)
Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Management by roaming and self-efficacy and their impact on the excellence of hotel service: An applied study
...Show More Authors

      This research investigates the type and the significant relationship between roaming management and self-efficacy and its impact on excellence in providing hotel service. To achieve this, the applied approach was adopted through  A questionnaire was designed and developed for the collected data. It has consisted of three parts. The firsts section included nine questions to measure the dimensions of management by roaming. The second section includes nine questions to measure the effectiveness of the two employees. The last section includes   12   questions to measure the excellence of the hotel service. The research sample included  43  employees' responding to this

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 02 2026
Journal Name
Journal Of The College Of Basic Education
Fuzzy Nonparametric Regression Model Estimation Based on some Smoothing Techniques With Practical Application
...Show More Authors

In this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .

View Publication Preview PDF
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Approaches to the formation of a contemporary explanatory mindset: Critical inductive study
...Show More Authors

The issue of the development of Qur'anic studies for the tasks, and the first thought of minds and multiple understandings, and the most precious ideas, and the alternatives were floated, and varied visions, especially as we live in an era exploding knowledge, and complicate secretions, and scramble his ideas, and to devise intellectual approaches To achieve the witnesses of civilization in the words of the Almighty (to be martyrs on the people) Surat Al - Baqarah / 143 attendance and participation in the achievement and a positive interaction with the participants of humanity and civilization in the light of the meaning (to know) rooms / 13.
Therefore, we must emerge from the one-dimensional view of the Koran to the complex mindset t

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
Almzna given in the consolation of the Prophet)) for women- an objective stu
...Show More Authors

 My research deals with the positions that the Prophet (PBUH) distressed. And condolences to those who lost her father and other problems and calamities that impede the life of women, has been given to the Lord of men, and good qualities, to strike the nation's finest proverbs in ensuring lost and lost of women and children, to be shown to us humanity in its finest form, and the best analyzed, and I hope God help And guidance and Rashad

View Publication Preview PDF