Preferred Language
Articles
/
kBjpR5UBVTCNdQwCjCup
THE IMPACT OF THE ROLE OF THE ORTHODOX CHURCH ON THE POLITICS OF THE RUSSIAN FEDERATION
...Show More Authors

The research tackles the nature of relationship between the Orthodox Church and the state in the Russian Federation. At the beginning of the nineties of the last century, the church had been performed a different role in its relationship with the state, and it had an effect over the internal and foreign policies for the Russian Federation. In political history of Russia, the church’s existence became an evident too much in comparing with the previous historical period, starting with the educational and political system, whether through a symbolic participating roles as what happened in the inauguration ceremony to take over responsibility of the head of state or taking actual roles such as influencing on the process of holding elections directly or indirectly. At the external level, the church’s role had emerged as such as in defending for the rights of Russian citizens who residing abroad. Or its role in supporting the state's foreign policies at the time of disrupted regional and international crises or wars. Furthermore, this role in spite of its prominence; but it still faces various social obstacles that represented the cultural character of Russian society alone. Especially, it had also been framed according to the constitutional principle of secularism of the state, in order to separate actually the religion from the state.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Suggested Index for studying violent by Environment and Psychology components among Collegian students at a sample in Baghdad City
...Show More Authors

Objective: To identification environmental and psychological violence's components among collegians’ students of different stages, and gender throughout creating specific questionnaire, and estimating regression of environmental domain effect on psychological domain, as well as measuring powerful of the association contingency between violence's domains in admixed form with respondent characteristics, such that (Demographics, Economics, and Behaviors), and extracting model of estimates impact of studied domains in studying risks, and protective factors among collegians’ students in Baghdad city. Methodolog

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 16 2016
Journal Name
The Iraqi Journal Of Agricultural Sciences
MEASURING VIBRATION AT TRACTOR PLATFORM , STEERING WHEEL AND SEAT EFFECTIVE AMPLITUDE TRANSMISSIBILITY FACTOR DURING OPERATION TILLAGE
...Show More Authors

Field experiment conducted to measure vibrations on three axes longitudinal X, lateral Y and vertical Z on steering wheel, platform tractor and vertical vibration in seat tractor and seat effective amplitude transmissibility (SEAT) factor during operation tillage in silt clay loam soil with depth 18 cm in Baghdad. Split – split plot design under randomized complete block design with three replications least significant design 5 % used. Three factor were used in this experiment included two types of plows included chisel and disc plows which represented main plot, three tires inflation pressure was second factor included 1.1 ,1.8 and 2.7 bar, and three forward speeds of the tillage was third factor included 2.35 , 4.25 and 6.50 km/hr. Resu

... Show More
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Fuzzy Survival and Hazard Functions Estimation for Rayleigh distribution
...Show More Authors

In this article, performing and deriving the probability density function for Rayleigh distribution by using maximum likelihood estimator method and moment estimator method, then crating the crisp survival function and crisp hazard function to find the interval estimation for scale parameter by using a linear trapezoidal membership function. A new proposed procedure used to find the fuzzy numbers for the parameter by utilizing (     to find a fuzzy numbers for scale parameter of Rayleigh distribution. applying two algorithms by using ranking functions to make the fuzzy numbers as crisp numbers. Then computed the survival functions and hazard functions by utilizing the real data application.

View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Iraqi Journal Of Physics
Linear and Non-Linear Optical Properties for Organic Semiconductor (CuPc) Thin Films
...Show More Authors

Thin films of CuPc of various thicknesses (150,300 and 450) nm have been deposited using pulsed laser deposition technique at room temperature. The study showed that the spectra of the optical absorption of the thin films of the CuPc  are two bands of absorption one in the visible region at about 635 nm, referred to as Q-band, and the second in ultra-violet region where B-band is located at 330 nm. CuPc thin films were found to have direct band gap with values around (1.81 and 3.14 (eV respectively. The vibrational studies were carried out using Fourier transform infrared spectroscopy (FT-IR). Finally, From open and closed aperture Z-scan data non-linear absorption coefficient and non-linear refractive index have been calculated res

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Deep Vein Thrombosis Predisposing Factors Analysis Using Association Rules Mining
...Show More Authors

Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 16 2022
Journal Name
Journal Of Economics And Administrative Sciences
Solving Resource Allocation Model by Using Dynamic Optimization Technique for Al-Raji Group Companies for Soft Drinks and Juices
...Show More Authors

In this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 08 2022
Journal Name
Mathematical Statistician And Engineering Applications
δ-Semi Normal and δ-Semi Compact Spaces
...Show More Authors

In this paper by using δ-semi.open sets we introduced the concept of weakly δ-semi.normal and δ-semi.normal spaces . Many properties and results were investigated and studied. Also we present the notion of δ- semi.compact spaces and we were able to compare with it δ-semi.regular spaces

View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF