Preferred Language
Articles
/
jmracpc-6
TIME MANAGEMENT AND WORK PRESSURE AND THEIR RELATIONSHIP TO ADMINISTRATIVE LEADERSHIP/ A CASE STUDY AT THE HIGHER INSTITUTE FOR ADMINISTRATIVE DEVELOPMENT OF SECURITY AND ADMINISRATIVE: TIME MANAGEMENT AND WORK PRESSURE AND THEIR RELATIONSHIP TO ADMINISTRATIVE LEADERSHIP/ A CASE STUDY AT THE HIGHER INSTITUTE FOR ADMINISTRATIVE DEVELOPMENT OF SECURITY AND ADMINISRATIVE
...Show More Authors

The research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of the administrative and clear in his work to receive it ambiguity in the roles Except Exclusive entrusted to him, which contributed to achieving the basic goals of the organization in which it operates, and recommended the researcher: the establishment of multi-tasking administrative leadership in the administrative organization of training courses at the Higher Institute of security and administrative development. The leader of the administrative and clear in his work to receive it ambiguity in the administrative roles assigned to it, contributing to the achievement of the basic goals of the organization in which it operates, the need for attention to the organization of time and administrative leadership because time is an important resource should be exploited in assisted to complete its work within the timings required from him.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Study About The Robustness Of The Bayesian Criterion
...Show More Authors

In this research work an attempt has been made to investigate about the Robustness of the Bayesian Information criterion to estimate the order of the autoregressive process when the error of this model,  Submits to a specific distributions and different cases of the time series on various size of samples by using the simulation,  This criterion has been studied by depending on ten distributions, they are (Normal, log-Normal, continues uniform, Gamma , Exponential, Gamble, Cauchy, Poisson, Binomial, Discrete uniform) distributions, and then it has been reached to many collection and recommendations related to this object , when the series residual variable is subject to each  ( Poisson , Binomial , Exponential , Dis

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Fri Oct 02 2026
Journal Name
Advances In Environmental Biology
A study effect of thyme on biochemical and histological changes in liver of male rats
...Show More Authors

Publication Date
Thu Aug 18 2016
Journal Name
Artificial Cells, Nanomedicine, And Biotechnology
Biosynthesis of silver nanoparticles from <i>Catharanthus roseus</i> leaf extract and assessing their antioxidant, antimicrobial, and wound-healing activities
...Show More Authors

View Publication
Scopus (145)
Crossref (120)
Scopus Clarivate Crossref
Publication Date
Sun Dec 25 2016
Journal Name
University Of Baghdad / College Of Education For Pure Sciences / Ibn-al-‎haitham/ Chemistry Department
Synthesis and Spectroscopic Studies and ‎Biological Activity of New Ligands ‎Containing S,N,O Donor Atoms with their ‎Metal Complexes
...Show More Authors

The 3-aminoacetophenone and 4-aminoantipyrine were used as ‎precursors to prepare new six ligands. The three new ligands (L1,L2 ‎and L3) were synthesis by reacting one mole of 3-aminoacetophenone ‎with one mole of (Acetyl chloride), (benzoyl chloride), (4-‎methoxybenzoyl chloride) and ammonium thiocyanat in acetone as a ‎solvent, they are:-‎ L1 (AAA) =[N-(3-acetylphenylcarbamothioyl)acetamide]‎ L2 (BAA) =[N-(3-acetylphenylcarbamothioyl)benzamide]‎ L3 (MAA) =[N-(3-acetylphenylcarbamothioyl)-4-methoxy benzamide]‎ Also three new derivatives of 4-aminoantipyrine were synthesis by ‎reacting one mole of 4-aminoantipyrine with one mole of (Acetyl ‎chloride), (benzoyl chloride), (4-methoxybenzoyl chloride) and ‎ammonium thio

... Show More
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Eco-Friendly Synthesis of Ag-ZnO Nanocomposite Using Aloe-vera, Hibiscus Sabdariffa Plants and Their Antibacterial and Anti-fungi Activities
...Show More Authors

The current study used extracts from the aloe vera (AV) plant and the hibiscus sabdariffa flower to make Ag-ZnO nanoparticles (NPs) and Ag-ZnO nanocomposites (NCs). Ag/ZnO NCs were compared to Ag NPs and ZnO NPs. They exhibited unique properties against bacteria and fungi that aren't present in either of the individual parts. The Ag-ZnO NCs from AV showed the best performance against E. coli, with an inhibition zone of up to 27 mm, compared to the other samples. The maximum absorbance peaks were observed at 431 nm and 410 nm for Ag NPs, at 374 nm and 377 nm for ZnO NPs and at 384 nm and 391 nm for Ag-ZnO NCs using AV leaf extract and hibiscus sabdariffa flower extract, respectively. Using field emission-scanning electron microscopes (FE-

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal For Sciences And Technology
Preparation of Carboxy Methylated mPEG-Block-(4-Dodecyl Anilide) Copolymers and Their Visco Metric and Surface Tension Properties in THF
...Show More Authors

Preparation of Carboxy Methylated mPEG-Block-(4-Dodecyl Anilide) Copolymers and Their Visco Metric and Surface Tension Properties in THF