Preferred Language
Articles
/
jpgiafs-786
Job satisfaction and its relation to the effectiveness of performance: Applied research on a sample of employees in the Federal board of supreme Audit
...Show More Authors

The research aimed to study the job satisfaction of the staff of the Federal board of supreme Audit and its relation to the effectiveness of their performance, The questionnaire was adopted as a main tool in the collection of data and information from a random sample of (54) employees of the Federal board of supreme Audit. In light of this, the data were collected and analyzed and the hypotheses were tested using the statistical program (SPSS).

The researchers reached a number of conclusions, the most important of which were: (1) the respondents' response to the variables of job satisfaction and the effectiveness of the performance were medium; (2) there was a significant relationship between job satisfaction and performance effectiveness of the staff of the Federal board of supreme Audit.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Anais Da Academia Brasileira De Ciências
Molecular characterization of viruses associated to leaf curl disease complex on zucchini squash in Iraq reveals Deng primer set could distinguish between New and Old World Begomoviruses
...Show More Authors

View Publication
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
A consensus on measurement
...Show More Authors

Many letters and theses written on the subject of consensus, as well as in measurement,
But we tried to address a topic of consensus

Building a blind measuring guide.
 We have tried to explain the meaning of convening, then the statement of consensus in language and terminology and then the statement of measurement
Also, we have shown the types of consensus mentioned by the jurists, and this is how much was in the first topic, either
The second section included the statement of the doctrines of the blind in the matter, and then the evidence of each doctrine and discussed.
We followed it with the most correct opinion statement and concluded the research with some of the conclusions we reached through
search.

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Business And Technopreneurship
Assessment of Entrepreneurship Education on the Relationship Between Attitude, Subjective Norms, Perceived Behavioural Control and Entrepreneurial Intention
...Show More Authors

Entrepreneurial events are understood to be imperious in accelerating the economic development of nations owing to a large number of jobs it creates. Thus, both developed and developing countries understand the importance of entrepreneurship education to instil student interest in entrepreneurial action. This study investigates the moderating effect of entrepreneurship education (EEP) on the relationship between attitude (ATT), subjective norms (SNMS), and perceived behavioural control (PBC) towards entrepreneurship intention (EINT) of university undergraduate students. The study population covered 794 students from all the four faculties of Northwest University Kano, that were taught a compulsory entrepreneurship education course in their

... Show More
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of Baghdad College Of Dentistry
The influence of prophylactic Dexamethasone on postoperative swelling and trismus following impacted mandibular third molar surgical extraction
...Show More Authors

Background: Pain, swelling and trismus are the main minor complications encountered after surgical extraction of impacted third molars, minimizing these postoperative complications is the center of many studies, one proposed method is the prophylactic administration of corticosteroids, the aim of this study is to evaluate the effect of prophylactic Dexamethasone administration on facial swelling and trismus after surgical extraction of impacted third molars. Materials and methods: 20 patients were included in this study, they were randomly divided into 2 groups of 10 patients each; a study group in which patients were given 8 mg. Dexamethasone 1 hour before surgical extraction of impacted third molar and 4 mg. 6 hours postoperatively, and a

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
Study on the Contact Angle, Adhesion Strength, and Antibacterial Activity of Polymer/Cement Composites for Waterproof Coating
...Show More Authors

     In the present work, polymeric composites were prepared for coating floors and swimming pools in dark colors. This was achieved through the use of a polymer coating solution added to fine cement with weight percentage (wt%) values of 5, 10, 15, 20, and 25 to obtain dark-colored (gray) composites. Mortar samples were prepared using the adhesion test. The contact angle and adhesion strength were studied for the prepared samples concerning the effect of changing the weight ratio of additive cement on water absorption. Also, the antibacterial activity was tested for the prepared coatings. The results showed that the contact angle increases with increasing the weight ratios of additive cement, which indicates that the

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
The Potential Barrier and Thermal Stability Dependence on PI Thickness of Al/PI/c-Si Schottky Diode
...Show More Authors

This research investigated the effectiveness of using different thickness values of polyimide (PI) interfacial layer in order to improve electrical and thermal properties of Al/ PI /c-Si capacitor. The PI spectra produced by poly(amic acid) (PAA) were characterized by using FT-IR analysis. After imidization of PAA, some absorption peaks vanished, whereas PI peaks appeared, due to the complete conversion of PAA to PI.

    The results show that thermal decomposition resistance of polyimide films increases with the increase of polyimide thickness, because of the increase of the imide bond and the decrease of the average distance between amide groups.

View Publication Preview PDF
Scopus (23)
Crossref (17)
Scopus Crossref