Preferred Language
Articles
/
jeasiq-984
Auto Risk Analysis in Iraq
...Show More Authors

يتنامى يوما بعد يوم استخدام السيارات وتتعاضم اعدادها ، فهذا هو عصر السرعة، وخاصة في مجال النقل والمواصلات، والتي تتحقق باستخدام وسائل النقل المختلفة ومن بينها السيارات، وبالتالي اصبحت هذه الوسيلة ضرورية لتحقيق هذه السرعة ومن ضرورات الحياة في انجاز الاعمال.

وتتبارى مصانع السيارات فيما بينها لانتاج انواع السيارات بمواصفات عالية من المتانة والامان والراحة، وفي ذات الوقت اصبحت هندسة الطرق علما متخصصا في مجال تصميم وانجاز الطرق الخارجية والشوارع الداخلية في المدن بهدف الوصول الى اعلى انسيابية في حركة سير السيارات والمشاة وبما يحقق اعلى درجة من الامان فيها. ومن جهة ثالثة يزداد اهتمام الحكومات والمنظمات والاتحادات الوطنية والعالمية بخصوص سن القوانين واصدار الانظمة والتعليمات والتوجيهات الهادفة الى رفع درجة الامان في حركة سير السيارات .

رغم كل هذا وذاك تتعاضم وباتجاه معاكس اخطار السيارات والحوادث المتحققة عنها ، وبالتالي تتعاظم الخسائر البشرية والمادية الناجمة عنها ، حتى اعدت اخطار السيارات من الاوبئة التي تعاني منها الدول ومظهرا معيبا من مظاهر التكنلوجيا مما حدا بالعديد من الباحثين والمنظمات والحكومات الى التصدي لهذه الظاهرة بالبحث والتحليل في محاولة للكشف عن اسبابها والعمل على تحجيم تلك الاسباب والقضاء عليها او تقليل الخسائر الناتجة عنها .

ويعد هذا البحث ضمن سياق الدراسات والبحوث التي تتناول موضوع تحليل اخطار السيارات ، الا انه ذو منحى مختلف بعض الشيء، اذ يعمد الى تحليل هذه الاخطار باربعة اتجاهات في ذات الوقت: الاول في في تحديد اخطار السيارات والاهمية النسبية لكل منها، والثاني في تحديد الاسباب الرئيسة والفرعية والثانوية لهذه الاخطار والاهمية النسبية لكل منها، والثالث في تحديد الخسائر البشرية والمادية المتحققة من هذه الاخطار ، واخيرا فان الاتجاه الرابع هو في تحديد اساليب مواجهة هذه الاخطار من خلال التصدي لأسبابها. ويتكون البحث من اربعة اقسام : تضمن القسم الاول استعراضا لمفهوم الخطر ومفهوم تحليل الخطر اضافة الى الاساليب العلمية المستخدمة في عملية التحليل، فيما يتضمن القسم الثاني منهجية البحث مستعرضا مشكلة البحث وهدفه وحدوده والاساليب المعتمدة في تحليله وفي جمع البيانات، اضافة الى عدد من الدراسات السابقة في هذا المجال ، اما القسم الثالث فيتضمن تحليل اخطار السيارات في العراق معتمدا على استعراض انواع الاخطار وحجم تحقق كل منها واهميتها النسبية وكذلك الاسباب (الرئيسة والفرعية والثانوية) والنتائج السلبية المتحققة منها واساليب المواجهة، واخيرا تضمن القسم الرابع الاستنتاجات والتوصيات التي تمخض عنها البحث.

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
New Approximation Operators Using Mixed Degree Systems
...Show More Authors

This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
Comparison study of CC and CH vibration frequencies and eelectronic properties for mono, Di, Tri, and tetra-rings layer of arm chair (SWCNTs)
...Show More Authors

Semi-empirical methods were applied for calculating the vibration frequencies and IR absorption intensities for normal coordinates of the {mono (C56H28), di (C84H28), tri (C112H28) and tetra (C140H28)} -rings layer for (7,7) armchair single wall carbon nanotube at their equilibrium geometries which were all found to have D7d symmetry point group.

Assignment of the modes of vibration (3N-6) was done depending on the pictures of their modes by applying (Gaussian 03) program. Comparison of the vibration frequencies of (mono, di, tri and tetra) rings layer which are active in IR, and inactive in Ramman spectra. For C-H stretching vibrat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 04 2025
Journal Name
Journal Of Studies And Researches Of Sport Education
The effect of using the educational bag on the level of learning some offensive skills with the epee weapon
...Show More Authors

View Publication
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Abuse elder and relationship life review
...Show More Authors

The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a

... Show More
View Publication Preview PDF
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
On Integrability of Christou’s Sixth Order Solitary Wave Equations
...Show More Authors

We examine the integrability in terms of Painlevè analysis for several models of higher order nonlinear solitary wave equations which were recently derived by Christou. Our results point out that these equations do not possess Painlevè property and fail the Painlevè test for some special values of the coefficients; and that indicates a non-integrability criteria of the equations by means of the Painlevè integrability.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Non-Parametric Quality Control Methods
...Show More Authors

    Multivariate Non-Parametric control charts were used to monitoring the data that generated by using the simulation, whether they are within control limits or not. Since that non-parametric methods do not require any assumptions about the distribution of the data.  This research aims to apply the multivariate non-parametric quality control methods, which are Multivariate Wilcoxon Signed-Rank ( ) , kernel principal component analysis (KPCA) and k-nearest neighbor (

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparative Study for the Early Detection of the most Important Factors Leading to Preeclampsia
...Show More Authors

 

The aim of this research is to determine the most important and main factors that lead to Preeclampsia. It is also about finding suitable solutions to eradicate these factors and avoid them in order to prevent getting Preeclampsia. To achieve this, a case study sample of (40) patients from Medical City - Oncology Teaching Hospital was used to collect data by a questionnaire which contained (17) reasons to be investigated. The statistical package (SPSS) was used to compare the results of the data analysis through two methods (Radial Bases Function Network) and (Factorial Analysis). Important results were obtained, the two methods determined the same factors that could represent the direct reason which causes Preecla

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Financial investment strategies – Conceptual Framework
...Show More Authors

The investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .

  &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref