Preferred Language
Articles
/
jmracpc-261
THE SUSTANABLE MARKETING IMMUNITY OF TOURIST OF BUSINESS IN LIGHT OF THE PANDEMIC-CORONA (COVID-19) AN APPLIED RESEARCH IN TRAVEL AND TOURISM COMPANIES IN BAGHDAD: THE SUSTANABLE MARKETING IMMUNITY OF TOURIST OF BUSINESS IN LIGHT OF THE PANDEMIC-CORONA (COVID-19) AN APPLIED RESEARCH IN TRAVEL AND TOURISM COMPANIES IN BAGHDAD
...Show More Authors

The research aims to how to deal with certain situation to ensure the continuous competitive excellence of business market under the situation of covid-19, especially how to deal with major challenges, identifying the capabilities of tourism industry, investigating the ability of tourism agencies to resist the dynamic change of both internal as well as external environment to ensure their sustainability.

The important here as the paper notice, is how to be efficient and trying to find solutions in order to grow and survive through choosing certain strategies that aligned the critical issues.

Thus to achieve this level, many scenarios planed that could adopt in case of such pandemic crises like (covid-19); certain techniques and methods drawn to re-engineer the process of tourism industry to ensure the sustain and sustain and survive. Tourism industry, like any other industries which affected either positively by unstable circumstances.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Advances In Science And Technology Research Journal
Power Predicting for Power Take-Off Shaft of a Disc Maize Silage Harvester Using Machine Learning
...Show More Authors

View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Isa Transactions
Design of a Complex fractional Order PID controller for a First Order Plus Time Delay system
...Show More Authors

View Publication
Scopus (51)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Robotics And Control (jrc)
Artificial Intelligence Based Deep Bayesian Neural Network (DBNN) Toward Personalized Treatment of Leukemia with Stem Cells
...Show More Authors

The dynamic development of computer and software technology in recent years was accompanied by the expansion and widespread implementation of artificial intelligence (AI) based methods in many aspects of human life. A prominent field where rapid progress was observed are high‐throughput methods in biology that generate big amounts of data that need to be processed and analyzed. Therefore, AI methods are more and more applied in the biomedical field, among others for RNA‐protein binding sites prediction, DNA sequence function prediction, protein‐protein interaction prediction, or biomedical image classification. Stem cells are widely used in biomedical research, e.g., leukemia or other disease studies. Our proposed approach of

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Energy Reports
Global solar radiation prediction over North Dakota using air temperature: Development of novel hybrid intelligence model
...Show More Authors

View Publication
Scopus (79)
Crossref (81)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Water Process Engineering
Waterworks sludge-filter sand permeable reactive barrier for removal of toxic lead ions from contaminated groundwater
...Show More Authors

Scopus (213)
Crossref (192)
Scopus Clarivate Crossref
Publication Date
Wed Sep 04 2024
Journal Name
F1000research
Posterior palatal seal recording: fact and reasons among Iraqi dentists
...Show More Authors

Abstract* Backgrounds The retention of the maxillary complete denture may be influenced by adequate recording in the patient’s mouth, marking, and carving of the post-dam on the maxillary cast. Failure to do so may lead to loss of retention. Successful denture construction with patient’s comfort could be achieved by effective methods of recording, marking, and carving of the post-dam. The aim of the study was to assess Iraqi dentists in their knowledge and application of the post-dam in maxillary complete dentures. Methods Questionnaires were distributed randomly through online Google Forms and 118 Iraqi dentists with different academic degree participated in the study. A multinomial logistic regression model was also used to ass

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Engineering
Buckling Loads and Effective Length Factor for Non-Prismatic Columns
...Show More Authors