Preferred Language
Articles
/
jperc-211
Existential frustration and its relation with recrimination among university students
...Show More Authors

The study aims to identify the level of existential frustration and the level of recrimination among the students of universities, identify the statistical differences between the existential frustration and recrimination based on gender, and finally, identify the correlation between the existential frustration and recrimination. To do this, the researcher adopted the existential frustration scale of ( al-saaedi, 2009) that consisted of (43) item, he also adopted the recrimination scale of ( al-zugeibi,2008) which composed of (31) item. The total sample was (120) male and female student were chosen randomly from four colleges within the university of Baghdad for the academic year ( 2015-2016). The results revealed that the targeted sample has an existential frustration, but it lacks the recrimination, there are no statistical differences between male and female for both existential frustration and recrimination, and there is a correlation between the existential frustration and recrimination among the targeted sample.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
Figure role in highlighting and content in the technical poster
...Show More Authors

The poster is one of the means which can be communicate with others through it, to transfer ideas that the designer want to focus on, for its importance to accomplish the poster. It’s a visual mean contact aim to submit an idea to the audience to get a clear idea, and that would be through the shapes and subject to submit the idea. Depend on that our goal in this study is to find out, what follows:1-Finding the relationship between the shape and the idea.And the study comes up with several results, like:1-The drawings that contain themes connected with what the designer want to achieve, through the clearness of idea and to make those elements clear by putting more elements to surround the main shape.2-To assure that the strong connecti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Water Hammer Arresters; Review Studies and Practical Experiments for Alternatives
...Show More Authors

The current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a number of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Density and Approximation by Using Feed Forward Artificial Neural Networks
...Show More Authors

I n  this  paper ,we 'viii  consider  the density  questions  associC;lted with  the single  hidden layer feed forward  model. We proved  that a FFNN   with   one   hidden   layer  can   uniformly   approximate   any continuous  function  in C(k)(where k is a compact set in R11 ) to any required accuracy.

 

However, if the set of basis function is dense then the ANN's can has al most one hidden layer. But if the set of basis function  non-dense, then we  need more  hidden layers. Also, we have shown  that there exist  localized functions and that there is no t

... Show More
View Publication Preview PDF
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Levels of interleukins 6 and 8 in Psoriatic patients serum
...Show More Authors

  Recent progress in the understanding of psoriasis has shown that the regulation of local and systemic cytokines plays an important role in its pathogenesis. Different studies evaluated the association of serum levels of some proinflammatory cytokines invivo and their correlation with severity of psoriasis. Eighty cases of psoriatic patients had been studied. Patients were divided into mild psoriasis group (30) and severe psoriasis group (50) according to severity, and (30) apparently healthy individuals ware used as acontrol group. Sera samples of all groups were collected from all individuals for the estimation levels of interleukins (IL-6 and IL-8).  All mean values sera levels (IL-6 32.004 pg/ml and 17.579 pg/ml  for

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
A Stylistic Study of English Aphorisms of “Life and Death”
...Show More Authors

In this paper , some of lexical stylistic , syntactical stylistic  devices , and one phonetic stylistic device are going to be illustrated in the study of the aphorisms of “life and death” . These stylistic  devices are parallelism , hyperbole , alliteration , meiosis , irony , oxymoron , cliché , litotes , metalepsis , and loose sentences.  This paper aims at identifying the functions and the  frequencies of these devices. These stylistic devices make one speech and writing more interesting and help to get the attention of readers/ listeners

View Publication Preview PDF
Publication Date
Sun Dec 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Analyzing and Optimizing Bits Performance in Three Iraqi Oil-Fields
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 04 2023
Journal Name
International Journal Of Professional Business Review
Leadership and Internal Communication Strategies in Public Organizations: Analytical Research
...Show More Authors

Purpose: As managers can lead a set of ways to improve internal communication in public organizations, and leadership can cultivate a common understanding of goals within the organization and share the vision in preparation for its way to better performance, the purpose of the research is to assess the type and strength of the relationship between internal communication and different forms of leadership.   Theoretical framework: The study demonstrates how leaders in public organizations improve internal communication, related to employees' perceptions of public organizations' routines and performance.   Design/methodology/approach: The  study  uses the  ordinary  least  squares  (OLS) and  applied multiple  regression A sa

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 14 2015
Journal Name
Journal Of Optoelectronics And Photonics (jop)
Preparation and Characterization of AL2O3 Nanostructures by Pulsed – Laser Deposition
...Show More Authors

Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref