Preferred Language
Articles
/
jmracpc-170
Raised excessive consumption on environment and price levels during the period 2005- 2013.: Raised excessive consumption on environment and price levels during the period 2005- 2013.
...Show More Authors

 

When the financial resources of individuals and groups available, this will lead to increase the consumption ranges and sometimes reached to excessive especially to the categories that have little awareness about economic importance and its reflections. it seems that consumerism has increased in many countries including Iraq because of many factors, and the most important one is the availability of financial resources as a result of the increase in oil exports as well as the spread of consumption media department at various levels especially.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 30 2006
Journal Name
Baghdad University
Unpublished Cuneiform Texts From The Reign Of The King Ammi Şaduqa
...Show More Authors

The cuneiform texts considered one of the most important resources which play an important role help us to know how was the economic , politic and religious manner and every thing have relation of the history of Mesopotamia which contain many of information that enrich our knowldgement every side of Mesopotamia civilization since using writing as away to register the science and human knowldgement . The city of Sippar (Abu –Habba ) was one of most important city of ancient Mesopotamia which mentioned as one of first five Mesopotamian cities found before floating and it exposed through excavating rich one of them tablet which some of it dated to old Babylon period . The king Ammi-Saduqa has a big share of tablet we study number of thi

... Show More
Publication Date
Fri Apr 01 2016
Journal Name
Astronomy Reports
Ionized gas in the circumgalactic vicinity of the M81 galaxy group
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security & Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Analytical Modeling of Stresses in the Wall 0f the Human Heart
...Show More Authors

The mechanical function of the heart is governed by the contractile properties of the cells, the mechanical stiffness of the muscle and connective tissue, and pressure and volume loading conditions on the organ. Although ventricular pressures and volumes are available for assessing the global pumping performance of the heart, the distribution of stress and strain that characterize regional ventricular function and change in cell biology must be known. The mechanics of the equatorial region of the left, ventricle was modeled by a thick-walled cylinder. The tangential (circumferential) stress, radial stress and longitudinal stress in the wall of the heart have been calculated. There are also significant torsional shear in the wall during b

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 10 2013
Journal Name
Asian Journal Of English Studies
The Use of Restrictive Relative Clauses in Letters to the Editors
...Show More Authors

A restrictive relative clause (RRC hereafter), which is also known as a defining relative clause, gives essential information about a noun that comes before it: without this clause the sentence wouldn’t make much sense. A RRC can be introduced by that, which, whose, who, or whom. Givon (1993, 1995), Fox (1987), Fox and Thompson (1990) state that a RCC is used for two main functions: grounding and description. When a RRC serves the function of linking the current referent to the preceding utterance in the discourse, it does a grounding function; and when the information coded in a RRC is associated with the prior proposition frame, the RRC does a proposition-linking grounding function. Furthermore, when a RRC is not used to ground a new di

... Show More
Publication Date
Sun Jun 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Studying the Factors Affecting the Drag Coefficient in Non- Newtonian Fluids
...Show More Authors

The aim of this research is to study the factors affecting drag coefficient (C d ) in
non-Newtonian fluids which are the rheological properties ,concentrations of non-
Newtonian fluids, particle shape, size and the density difference between particle and
fluid .Also this study shows drag coefficient (C d ) and particle Reynolds' number (Re
P ) relationship and the effect of rheological properties on this relationship.
An experimental apparatus was designed and built, which consists of Perspex pipe
of length of 160 cm. and inside diameter of 7.8 cm. to calculate the settling velocity,
also electronic circuit was designed to calculate the falling time of particles through
fluid.
Two types of solid particles were

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Planning the main production tables using the correct binary programming method
...Show More Authors

This research include building mathematical models for aggregating planning and shorting planning by using integer programming technique for planning master production scheduling in order to control on the operating production for manufacturing companies to achieve their objectives of increasing the efficiency of utilizing resources and reduce storage and  improving customers service  through  deliver in the actual dates and reducing delays.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 29 2022
Journal Name
Current Trends In Geotechnical Engineering And Construction
Identify the Critical Risk Factors at the Tendering Phase in Iraq
...Show More Authors

Risk factors can be considered unique in construction projects, especially in tendering phase. This research is directed to recognize and evaluate the importance of critical risk factors in the tendering phase related to Iraq’s construction project. As a rule, construction projects are impacted by risk factors throughout the project life cycle; without identifying and allocating these risk factors, the project cannot succeed. In this paper, the open and closed questionnaires are used to categorize the critical risk factors in tendering phase. Research aims to recognize the factors that influence the success of tendering phase, to determine the correct response to the risk’s factors in this research article, (IBM, SPSS, V23) package has

... Show More
View Publication
Scopus Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 03 2023
Journal Name
International Journal Of Advances In Science, Engineering And Technology
VISUAL INTERACTION TECHNOLOGY IN THE PEDIATRIC MEDICALDEPARTMENTS OF THE EDUCATIOAL HOSPITAL.
...Show More Authors