Preferred Language
Articles
/
qxdbVJIBVTCNdQwCYquB
Measure awareness Petknlogia the information and its impact on the attainment of knowledge to solve the problems of scientific research material for the students of the fourth stage at the Faculty of Physical Education for Girls
...Show More Authors

يعتقد البعض ان مفهوم العلم يعني الآلات والاجهزة العلمية (تقنيات التعليم) وهي لا تختلف عن مفهوم تكنولوجيا المعلومات , ويعد هذا الاعتقاد خاطئ , لان العلم هو بناء المعرفة العلمية المنظمة والتي يتم التوصل اليها عن طريق البحث العلمي , اما تكنولوجيا المعلومات فهي "التطبيقات العملية للمعرفة العلمية في مختلف المجالات ذات الفائدة المباشرة بحياة الانسان, او هي النواحي التطبيقية للعلم وما يرتبط بها من آلات واجهزة".

View Publication
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
High performance work systems and general industrial enterprise performance
...Show More Authors

High performance work systems and general industrial enterprise performance

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Channel Estimation and Prediction Based Adaptive Wireless Communication Systems
...Show More Authors

Wireless channels are typically much more noisy than wired links and subjected to fading due to multipath  propagation which result in ISI and hence high error rate. Adaptive modulation is a powerful technique to improve the tradeoff between spectral efficiency and Bit Error Rate (BER). In order to adjust the transmission rate, channel state information (CSI) is required at the transmitter side.

In this paper the performance enhancement of using linear prediction along with channel estimation to track the channel variations and adaptive modulation were examined. The simulation results shows that the channel estimation is sufficient for low Doppler frequency shifts (<30 Hz), while channel prediction is much more suited at

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Operations Rescheduling Strategies, Policies, and Methods: A Philosophic Approach
...Show More Authors

When scheduling rules become incapable to tackle the presence of a variety of unexpected disruptions frequently occurred in manufacturing systems,  it is necessary to develop a reactive schedule which can absorb the effects of such disruptions. Such responding requires efficient strategies, policies, and methods to controlling production & maintaining high shop performance. This can be achieved through rescheduling task which defined as an essential operating function to efficiently tackle and response to uncertainties and unexpected events. The framework proposed in this study consists of rescheduling approaches, strategies, policies, and techniques, which represents a guideline for most manufacturing companies operatin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Multi-dimensional poverty and sustainable human development in Iraq
...Show More Authors

The problem of poverty and deprivation constitute a humanitarian tragedy and its continuation may threaten the political achievements reached by the State. Iraq, in particular, and although he is one of the very rich countries due to availability of huge economic wealth, poverty indicators are still high. In addition, the main factor in the decline in the standard of living due to the weakness of the government's performance in the delivery of public services of water, electricity and sanitation. Thus, the guide for human development has been addressed which express the achievements that the state can be achieved both on a physical level or on the human level, so in order to put appropriate strategies and policies aimed at elimin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Oil Sector in Iraq (Reality and Prospects) Economic Analysis
...Show More Authors

   The oil sector in Iraq suffered from several difficulties led to the decline and reduction of oil production and the deterioration of refineries and transport pipeline status in addition to the weakness of the technology side and the prevalence of financial and administrative corruption besides the high costs of rehabilitation of the oil sector and also administrative and institutional problems still ongoing. 

 In spite of Iraq's possession of vast oil wealth allows him to play an important role in the international energy market، he is still under the level. The production of oil doesn'<

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
CD34 and Wnt3 expression in potentially malignant oral disorders
...Show More Authors

Background: Potentially malignant oral disorders (PMODs) are common precursors of oral squamous cell carcinoma (OSCC). Neoangiogenesis and signalling are important intermediate biomarkers that may govern the progression of dysplastic mucosa into carcinoma. Aims: Evaluate the importance of CD34 and Wnt3 expression in PMODs and OSCCs in relation to their clinicopathological parameters. Settings and Design: Prospective cross-sectional study. Materials and Methods: Immunohistochemical staining for CD34 and Wnt3 was performed for 41 samples. These included 27 PMODs, six OSCCs and eight normal gingival and alveolar mucosa. Analysis of variance (ANOVA) and post-hoc tests were applied. P<0.05 was considered statistically significant. Results: CD34

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Bas.j
PARATHYROID GLAND, ANATOM, HISTOLOGY, AND PHYSIOLOGY (A SHORT REVIEW)
...Show More Authors

Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Stability and periphery in Graphic design: دينا محمد عناد
...Show More Authors

Graphic design art depends on changeable cognitive systems which their relation and items relying on the accumulation of humane knowledge and thong and the humane look to the venality and his explanation to the relation between him and the venality , then the graphic design art becomes an important item of this accumulation knowledge besides , it is on kind of knowledge kinds . The technological advancement in communication lauds to increasing in communication media and design methods , where the computer and its application in graphic design promotes the design process because of it's capalebities which lead to in creasing in production process , minimizing the cost and time and achieving creative and aesthetic aspect because of it's fe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref