Preferred Language
Articles
/
jpgiafs-786
Job satisfaction and its relation to the effectiveness of performance: Applied research on a sample of employees in the Federal board of supreme Audit
...Show More Authors

The research aimed to study the job satisfaction of the staff of the Federal board of supreme Audit and its relation to the effectiveness of their performance, The questionnaire was adopted as a main tool in the collection of data and information from a random sample of (54) employees of the Federal board of supreme Audit. In light of this, the data were collected and analyzed and the hypotheses were tested using the statistical program (SPSS).

The researchers reached a number of conclusions, the most important of which were: (1) the respondents' response to the variables of job satisfaction and the effectiveness of the performance were medium; (2) there was a significant relationship between job satisfaction and performance effectiveness of the staff of the Federal board of supreme Audit.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
The characteristics of political relations between the Arab and the Persian during the reign of the sassane kings “Ardashir the first, shahbour the first, shahbour the second, Bahram the fifth; kisra Anushrwan and kisrah Abruis” as amodel
...Show More Authors

This paper depends on sheding some litgt on the characteristics of political
relations between the arab and the Persian during the reign of sassane kings.
"Ardashir the first, shahbour the first, shahbour the second, Bahram the fifth; kisra
Anushrwan and kisrah abruis"
And who rulled the Persian before the Islamic conquest and were adopted in this studym
as a model. It was possible to get some information from invaluable refereces in order to
arrive at a clear image as regards the nature of these relations. These relations were
differently political according to the circumstances of ruling, interests and the personality
of those kings.

View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Preparation, characterization and study of biological activity and laser effect on the new Cu(II) complexes containing mixed benziloxime and furfuraldehydeazine ligands
...Show More Authors

Abstract: New copper(II) complexes with mixed ligand benziloxime (BOxH) and furfural-dehydeazine (FA) using classical (with and without solvent) and microwave heating methods have been prepared. The resulting complexes have been characterized using physico-chemical techniques. The study suggested that the ligands formed neutral complexes had general formulas [Cu(FA)(BOXH)(Ac)2] and [Cu(FA)(BOX)(OH)] in neutral (or acidic) and basic medium, respectively. Accordingly, hexa-coordinated mono-nuclear complexes have been investigated by this study and having distorted octahedral geometry. The effect of laser have been studied on solid ligands and solid complexes, no effect have been observed on most compounds through the results of melting poin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Environmental Nanotechnology Monitoring & Management
Green approach for the synthesis of graphene glass hybrid as a reactive barrier for remediation of groundwater contaminated with lead and tetracycline
...Show More Authors

Scopus (20)
Crossref (4)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Production of protease, an analyst for the blood clot from a variety of fungal isolates / 1 rating fungal isolates and agricultural circles
...Show More Authors

House 21 fungal isolates fungus to the analyst Albroca output of manufactured blood clot from the Blama human blood showed positive fungi to test analyzes blood clot variation in times where decomposition recorded fungi

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
2018 Detroit, Michigan July 29 - August 1, 2018
Design and validation of an electronic data logging systems (CAN Bus) for monitoring machinery performance and management- Planting application
...Show More Authors

View Publication
Scopus (7)
Scopus Crossref
Publication Date
Sun May 23 2010
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sc I
Synthesis, Spectroscopic and Dyeing Performance Studies of Some New Heterocyclic Azo Dyes and Their Complexes with Selected Metal Ions
...Show More Authors

Coupling reaction of m-and p- amino acetop henone and p-amino benzoic acid with (LHistidine) gave the new bidentate azo ligands (L1, L2 and L3). The prepared ligands were identified by FT-IR, UV-Vis, 1HNMR and GC- mass sp ectroscopic technique. Treatment of the prepared ligands with the following metal ions (CoII, NiII, CuII, ZnII, CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M (L)2 Cl2]. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis and 1HNMR spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the com

... Show More
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (10)
Scopus Crossref