Preferred Language
Articles
/
jpgiafs-548
Multi-pages structure for Six Sigma performance matrix based on the technical characteristics of balanced performance and methodology Al-Sigma for measuring corporate performance: Suggestion vision
...Show More Authors

Accelerates operating managements in the facilities contemporary business environment toward redefining processes and strategies that you need to perform tasks of guaranteeing them continue in an environment performance dominated by economic globalization and the circumstances of uncertainty attempt the creation of a new structure through multiple pages seek to improve profitability and sustainable growth in performance in a climatefocuses on the development of institutional processes, reduce costs and achieve customer satisfaction to meet their demands and expectations are constantly changing. The research was presented structural matrix performance combines methodology Alsigma in order to improve customer satisfaction significantly between Technology performance balanced with a view to achieving the goals of the business financial and non-financial cross-axes multi for continuous improvement and strengthening of management responsibility and encourage the participation of human resources in achieving measurements of performance objectives.The research found that guided the elements and principles of the matrix of the performance of the Six Sigma related leadership and profitability, management and optimization, sales and distribution, service and growth, human resources and innovation, operational excellence and management of procurement and suppliers will enable the administration to achieve improvement and profitability and processes within the business all the efficiency, effectiveness and economic.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Characteristics of the folkloric shapes in the works of the potters Sajida al-Mashayikhi and Siham al-Saudi (acomparative study): وفاء حرب عبد اللطيف
...Show More Authors

The research deals with the formal characteristics of folklore in contemporary Iraqi ceramics as a comparative study between the two potters Siham Al-Saudi and Sajida Al-Mashayikhi.
The research consists of four chapters. The first chapter is concerned with the research problem, the importance, the objectives, and the limits of the research, while the aim of the research answers the following question: The method and mechanisms of employing the traditional elements and vocabulary in the products of the potters “Seham Al-Saudi and Sajida Al-Mashaikhi”.
The second chapter came in the theoretical framework of the investigations and includes: The first topic: The second topic the movement in shaping contemporary Iraqi ceramics, whi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 17 2023
Journal Name
Sustainability
Sustainable Utilization of Machine-Vision-Technique-Based Algorithm in Objective Evaluation of Confocal Microscope Images
...Show More Authors

Confocal microscope imaging has become popular in biotechnology labs. Confocal imaging technology utilizes fluorescence optics, where laser light is focused onto a specific spot at a defined depth in the sample. A considerable number of images are produced regularly during the process of research. These images require methods of unbiased quantification to have meaningful analyses. Increasing efforts to tie reimbursement to outcomes will likely increase the need for objective data in analyzing confocal microscope images in the coming years. Utilizing visual quantification methods to quantify confocal images with naked human eyes is an essential but often underreported outcome measure due to the time required for manual counting and e

... Show More
View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Advances In Mechanical Engineering
Experimental and Numerical Investigations of Heat Transfer Characteristics for Impinging Swirl Flow
...Show More Authors

This paper reports experimental and computational fluid dynamics (CFD) modelling studies to investigate the effect of the swirl intensity on the heat transfer characteristics of conventional and swirl impingement air jets at a constant nozzle-to-plate distance ( L = 2 D). The experiments were performed using classical twisted tape inserts in a nozzle jet with three twist ratios ( y = 2.93, 3.91, and 4.89) and Reynolds numbers that varied from 4000 to 16000. The results indicate that the radial uniformity of Nusselt number (Nu) of swirl impingement air jets (SIJ) depended on the values of the swirl intensity and the air Reynolds number. The results also revealed that the SIJ that was fitted with an insert of y = 4.89, which correspo

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Hexagonal structure impeded intellectual youth for the advancement of civilization duty and mechanisms to address them
...Show More Authors

Photos of the backwardness of the Muslims and their backwardness in creating
sustainable development policies have driven them to a state of civilization , which witnesses
Avckaddoha time ago and not disrupt the adversary is a phenomenon thought the youth to
exercise its role and duty in the construction and development of the state witnesses Mdanah
civilized nation.
The vigilance thought the youth of its slumber correct form could provide opportunities for
growth and development in the Arab and Islamic worlds, and both material and moral support
through the creation model youth Islamic social role models, but that the image of the model
, , - 1

View Publication Preview PDF
Publication Date
Thu Jan 06 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Nurse-Midwife's Knowledge and Performance Regarding Immediate Newborn Care in Delivery Rooms at Maternity Hospitals in Baghdad City
...Show More Authors

Objectives: To assess nurses-midwives knowledge and performance regarding immediate newborn care in delivery rooms, and to identify the relationship between nurses-midwives knowledge and performance and their socio-demographic and professional variables regarding immediate newborn care.

 

 

 

Methodology: A descriptive study was conducted from 1st of October, 2019 to 20TH of October, 2020 at three maternity teaching hospitals in Baghdad city/Al-Russafa Health Directorate: Al-Elwiya Maternity Teaching Hospital, Fatema Al- Zahra Maternity and Pediatric Hospital, Al- Za'faraniyah General Hospital. Non-probability (purposive sample) include

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Optics And Applications
Modeling and Analysis of a Miniaturized Ring Modulator Using Silicon-Polymer-Metal Hybrid Plasmonic Phase Shifter. Part II: Performance Predictions
...Show More Authors

The ring modulator described in part I of this paper is designed here for two operating wavelengths 1550nm and 1310nm. For each wavelength, three structures are designed corresponding to three values of polymer slot widths (40, 50 and 60nm). The performance of these modulators are simulated using COMSOL software (version 4.3b) and the results are discussed and compared with theoretical predictions. The performance of intensity modulation/direct detection short range and long rang optical communication systems incorporating the designed modulators is simulated for 40 and 100Gb/s data rates using Optisystem software (version 12). The results reveal that an average energy per bit as low as 0.05fJ can be obtained when the 1550nm modulator is d

... Show More
View Publication
Publication Date
Tue Jun 21 2022
Journal Name
Peerj Computer Science
Performance evaluation of frequency division duplex (FDD) massive multiple input multiple output (MIMO) under different correlation models
...Show More Authors

Massive multiple-input multiple-output (massive-MIMO) is considered as the key technology to meet the huge demands of data rates in the future wireless communications networks. However, for massive-MIMO systems to realize their maximum potential gain, sufficiently accurate downlink (DL) channel state information (CSI) with low overhead to meet the short coherence time (CT) is required. Therefore, this article aims to overcome the technical challenge of DL CSI estimation in a frequency-division-duplex (FDD) massive-MIMO with short CT considering five different physical correlation models. To this end, the statistical structure of the massive-MIMO channel, which is captured by the physical correlation is exploited to find sufficiently

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref