Preferred Language
Articles
/
qhb-BIcBVTCNdQwC1i2q
6G Wireless Communications Networks: A Comprehensive Survey
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Interactive Role of Organizational Elegance between Organizational Anomaly and Planned Human Resource Behavior A survey of a sample of workers in the Ministry of Construction and Housing
...Show More Authors

This study attempts to test the interactive role played by organizational agility in enhancing the effect of organizational anomie on the behavior of planned human resources. The study of organizational anomie has increased because of the moral and legal pressures facing the organization by the external environment within its framework. To adapt to all external developments faced by these organizations, the behavior of human resources planned reflects the ability of individuals to control their behavior in different situations and situations that face them in the work.

The problem of the research indicates that there is a clear lack of understanding of what is meant by the variables studied in the sample

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 13 2021
Journal Name
Iraqi Journal Of Science
Using Temperature and Humidity Wireless Sensor and An Arduino Board to Characterise and Verify Climatic and Thermostatic Chambers on A Webpage According to Standard NF X 15-140
...Show More Authors

Environmental controls, especially for temperature and humidity, are essential to maintain the safety, purity and effectiveness of drugs. The measurement of humidity can be particularly difficult and important in climatic and thermostatic chambers (warehouses, ovens, cold rooms, fridges, drying rooms, insulated boxes, etc.).
The old method of monitoring and qualification of climatic and thermostatic chambers requires placing a defined number of recorders, then programming and store them. After that, to examine the values recorded to revolve the status of the climatic and thermostatic chambers, if they are compliant or not-complaint at any time, so all that goes to waste time and efficiency of values.
We can do the monitoring and qu

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Science And Research (ij
Simulation of Chlorine Decay in Al-Gukook WaterDistribution Networks Using EPANET
...Show More Authors

The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calib

... Show More
Publication Date
Wed Jan 13 2016
Journal Name
University Of Baghdad
Employ Mathematical Model and Neural Networks for Determining Rate Environmental Contamination
...Show More Authors

Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Survey of histeridae beetles with forensic important in Kerbela Province-Iraq
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Detection of COVID-19 in X-Rays by Convolutional Neural Networks
...Show More Authors

      Coronavirus is considered the first virus to sweep the world in the twenty-first century, it appeared by the end of 2019. It started in the Chinese city of Wuhan and began to spread in different regions around the world too quickly and uncontrollable due to the lack of medical examinations and their inefficiency. So, the process of detecting the disease needs an accurate and quickly detection techniques and tools. The X-Ray images are good and quick in diagnosing the disease, but an automatic and accurate diagnosis is needed. Therefore, this paper presents an automated methodology based on deep learning in diagnosing COVID-19. In this paper, the proposed system is using a convolutional neural network, which is considered one o

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Physics
Natural radioactivity survey in Al-Jabal Al-Gharbi Mountain Region Libya
...Show More Authors

The measurement of natural radioactivity in a given region or country is essential to provide a reference base-line map to follow up a possible variation in future. In order to perform such measurement, the natural radioactivity was measured in different locations. The locations (50 sites) were distributed over Al-Jabal Al-Gharbi Mountain, starting from the city Al-Azeeziah in the eastern part to Wazen on the Tunisian border in the west. The measurements showed obvious variation from one site to another. The levels were fluctuating from (12.8 counts/minute) in Bir-Ayad to (45.7 counts/minute) in Gherian.
In order to investigate the cause for such variation, samples were collected from (27) sites for detailed study. The levels of natur

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Ensemble Approach for Detecting COVID-19 Propaganda on Online Social Networks
...Show More Authors

     COVID-19 affected the entire world due to the unavailability of the vaccine. The social distancing was a contributing factor that gave rise to the usage of Online Social Networks. It has been seen that people share the information that comes to them without verifying its source . One of the common forms of information that is disseminated that have a radical purpose is propaganda. Propaganda is organized and conscious method of molding conclusions and impacting an individual's contemplations to accomplish the ideal aim of proselytizer. For this paper, different propagandistic tweets were shared in the COVID-19 Era. Data regarding COVID-19 propaganda was extracted from Twitter. Labelling of data was performed manually using diffe

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref