Preferred Language
Articles
/
jperc-1200
Evaluating Educational Programs in Combating Indecent Behaviors Among University Students Using Structural Equation Modeling (Field study: Northern Border University)
...Show More Authors

The study aimed to evaluate educational programs efficiency in applying the best educational practices to educate students from the dangers of indecent behaviors, in line with higher education policy and the appropriateness of educational program dimensions to spread awareness among students to not fall into the indecent behaviors clutches. The study adopted the inductive exploratory approach through structural equation modeling and the descriptive analysis of the collected data from randomly selected sample (n=385) from educational academics at Northern Border University in the Saudi Arabia using a specially designed survey tool to meet study purposes to evaluate dimensions of teaching methods, evaluation tools, training courses, course descriptions, and technology use. Findings showed that overall means were medium, and regression coefficients of the five dimensions of current educational program were acceptable and less than (0.5), which confirms the efficiency of the educational program in combating indecent behaviors, with exception of significance impact of both course description and technology use from females' perspectives. The course description had the lowest percentage of saturation in terms of confirming factor analysis with a value of (0.26) and its negative correlation with the use of technology. In addition the study set many recommendations.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Delay differential equation of the 2nd order and it's an oscillation yardstick
...Show More Authors

This study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
The Approximate Solution of Fractional Damped Burger’s Equation and its Statistical Properties
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Recovery of temporal coefficient for heat equation from non-local overdetermination conditions
...Show More Authors
Abstract<p>Recovery of time-dependent thermal conductivity has been numerically investigated. The problem of identification in one-dimensional heat equation from Cauchy boundary data and mass/energy specification has been considered. The inverse problem recasted as a nonlinear optimization problem. The regularized least-squares functional is minimised through lsqnonlin routine from MATLAB to retrieve the unknown coefficient. We investigate the stability and accuracy for numerical solution for two examples with various noise level and regularization parameter.</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using the Artificial Gas Lift to Increase the Productivity of Noor Oil Field / Mishrif Formation
...Show More Authors

Noor Oil Field is one of Iraqi oil fields located in Missan province / Amarah city. This field is not subjected to licensing rounds, but depends on the national effort of  Missan Oil Company. The first two wells in the field were drilled in seventies and were  not opened to production until 2009. The aim of this study is to study the possibility of using the method of gas lift to increase the productivity of this field . PROSPER software was used to design the continuous  gas lift by using maximum production rate in the design.

   The design was made after comparing  the measured pressure with the calculated pressure, this comparison  show  that the method of Beggs-Brill and Petroleum Exper

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 09 2021
Journal Name
Abu Dhabi International Petroleum Exhibition & Conference
Numerical Simulation of Gas Lift Optimization Using Artificial Intelligence for a Middle Eastern Oil Field
...Show More Authors
Abstract<p>Artificial lift techniques are a highly effective solution to aid the deterioration of the production especially for mature oil fields, gas lift is one of the oldest and most applied artificial lift methods especially for large oil fields, the gas that is required for injection is quite scarce and expensive resource, optimally allocating the injection rate in each well is a high importance task and not easily applicable. Conventional methods faced some major problems in solving this problem in a network with large number of wells, multi-constrains, multi-objectives, and limited amount of gas. This paper focuses on utilizing the Genetic Algorithm (GA) as a gas lift optimization algorit</p> ... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Risk management of foreign exchange rates using financial hedging instruments: Applied Analytical Study
...Show More Authors

Management of Foreign Exchange Rate Exposure by Using Financial Hedging An Analytical Empirical Study The main purpose of this Research is to investigate the ability to reduce the  effect  of exchange rate fluctuation on firm value , by usage appropriate hedging strategies to provide the firms force to adopted with complex and highly uncertainty conditions , characteristic of the most of the financial markets  . The field of this study is the giant five Multinational on the world. Nokia, Toyota Motor, Intel , Coca Cola, Microsoft. practical analysis is provide the truth of all study's  hypothesis , and it is reach to many of conclusion, the most important of them is  Stem from unexpected fluctuation on nominal ex

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (8)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The added value of the knowledge assets using a scale (VAIC) in a sample of the industrial sector companies
...Show More Authors

The sustainable competitive advantage for organizations is one of the requirements for value creation, which centered on the possession of scarce resources that achieve maximum flows to invest in intellectual capital, if what has been interest in them, measured and employed the way properly and style, so I figured the need for new technologies to enable organizations to measure the intellectual and physical assets and to assess its performance accordingly, so it sheds search light on the measurement of the added value of existing knowledge using the standard value-added factor is the intellectual (value added intellectual coefficient) (VAIC) and to develop a set of assumptions about the extent of the difference between the sample

... Show More
View Publication Preview PDF
Crossref