Preferred Language
Articles
/
jpgiafs-238
Activity, Profitability Indictors Analysis: A Comparsion Study among Nationality and Iraqi Insurance Company
...Show More Authors

Reseach target the most important topic, is Activity and ProfitabilityIndictors Analysis for
Nationality and Iraqi Insurance Company, In order to stand on them ability to cover its risks
and explore the efficiency asset and its avialible resources using to determine them abilities to
profit generation from its insurance activity. The analysis was focus to examine their profit
and activity power, and test the significant differences aming them performance. Test 2
hypothese that is related and result it sign that the 2 company no has significant differences at
profitability and activity level. The research depend on coneclusion, recommended two
company to work at efficiency with cost element of insurance activity in order to maximize
the insurance surpluse average, by using the successful viechals to insurance services
marketing to large number of insurance applicatoers according to apply the electronic
management requirement

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Tue Nov 11 2025
Journal Name
Alustath Journal For Human And Social Sciences
Efforts of Modern Arabs in Neurolinguistics, a cognitive approach
...Show More Authors

Neurolinguistics is a new science, which studies the close relationship between language and neuroscience, and this new interdisciplinary field confirms the functional integration between language and the nervous system, that is, the movement of linguistic information in the brain in receiving, acquiring and producing to achieve linguistic communication; Because language is in fact a mental process that takes place only through the nervous system, and this research shows the benefit of each of these two fields to the other, and this science includes important topics, including: language acquisition, the linguistic abilities of the two hemispheres of the brain, the linguistic responsibility of the brain centers, and the time limit for langua

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Cogent Engineering
Content-based image retrieval: A review of recent trends
...Show More Authors

View Publication
Scopus (118)
Crossref (107)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
A Systematic Review of Brain-Computer Interface Based EEG
...Show More Authors

The futuristic age requires progress in handwork or even sub-machine dependency and Brain-Computer Interface (BCI) provides the necessary BCI procession. As the article suggests, it is a pathway between the signals created by a human brain thinking and the computer, which can translate the signal transmitted into action. BCI-processed brain activity is typically measured using EEG. Throughout this article, further intend to provide an available and up-to-date review of EEG-based BCI, concentrating on its technical aspects. In specific, we present several essential neuroscience backgrounds that describe well how to build an EEG-based BCI, including evaluating which signal processing, software, and hardware techniques to use. Individu

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Solving a three dimensional transportation problem using linear programming
...Show More Authors

Transport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
World Academy Of Sciences Journal
Serum angiopoietin‑1 as a biomarker of missed miscarriage
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
ZOOPHTHORA PHYTONOMI (ZYGOMYCETES: ENTOMOPHTHORACEAE) A NEW RECORD IN IRAQ
...Show More Authors

    Morphological and phonological studies of fungal pathogen infecting alfalfa weevil Hypera postica (Gyllenhal) indicating that infection has been shown to develop along two distinct physiological lines, each culminating in the production of either conidial or resting spores, in host cadavers which are morphologically distinct. The percent of infection and epizootic development appeared to be dependent on host density. Farther evidence to entail proper correlation between conidia and resting spores suggest that these two forms of spores are stages in the development of one pathogen.

View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Journal Of Engineering
Methods for Removing Dyes from Polluted Water; A Review
...Show More Authors

Most of the water pollutants with dyes are leftovers from industries, including textiles, wool and others. There are many ways to remove dyes such as sorption, oxidation, coagulation, filtration, and biodegradation, Chlorination, ozonation, chemical precipitation, adsorption, electrochemical processes, membrane approaches, and biological treatment are among the most widely used technologies for removing colors from wastewater. Dyes are divided into two types: natural dyes and synthetic dyes.

View Publication Preview PDF
Crossref (3)
Crossref