Preferred Language
Articles
/
rRbGWIsBVTCNdQwCTMm4
Resistivity surveys application for detection of shallow caves in a case example from Western Iraq
...Show More Authors

Scopus
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Competitiveness of an enterprise under a flexible manufacturing system. Manufacturing strategy and flexibility - Case study
...Show More Authors

The research has designed for studying the relationship between manufacturing strategy and its flexibility under the flexible manufacturing system with their reflection on the competitive environmental performance of the firm. To interpret and tackle the problem, a hypothesis has formulated stating that “ the competitive performance of a firm is interpreted by the manufacturing strategy and flexibility which are derived from the firm and its business  strategies under the flexible manufacturing system”. Related literatures with their theoretical dissertations, which enhanced the thoughtful content, have analyzed. An illustrative case study on the flexible manufacturing system at Toyota Motors Corporation working at the g

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Arpn Journal Of Engineering And Applied Sciences
Implementation And Evaluation Of Apm 2.6 - Controlled Quadcopter With Aerial Imagery As A Case Study
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon Jun 30 2025
Journal Name
Scripta Medica
Case Report: A Rare Presentation of Sigmoid Volvulus During Pregnancy With an Integrative Postoperative Approach
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Estimation of Water and Energy Saving by Rainwater Harvesting: Sulaimani City as a Case Study
...Show More Authors

Rainwater harvesting could be a possible solution to decrease the consequences of water scarcity and energy deficiency in Iraq and the Kurdistan Region of Iraq (KRI). This study aims to calculate the water and energy (electricity) saved by rainwater harvesting for rooftops and green areas in Sulaimani city, KR, Iraq. Various data were acquired from different formal entities in Sulaimani city. Moreover, Google Earth and ArcMap 10.4 software were used for digitizing and calculating the total rooftop and green areas. The results showed that for the used runoff coefficients (0.8 and 0.95), the harvested rainwater volumes were 2901563 and 12197131 m³ during the study period (2005 – 2006) and (2019-2020). Moreover, by compa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun May 07 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF MINERAL AND MICROBIAL CONTAMINATION IN CEREAL AND IT,S PRODUCTS: DETECTION OF MINERAL AND MICROBIAL CONTAMINATION IN CEREAL AND IT,S PRODUCTS
...Show More Authors

The results shows existence of metals such as copper, iron, Cadmium, lead and zinc in most of examined samples , the highest concentration are up to (2.26, 40.82, 282.5, 31.02, 19.26, 4.34) Part per million) ppm) in pasta hot (Zer brand), Indomie with chicken, granule (Zer brand), brand (Zer brand), and rice (mahmood brand) respectively, with presence nickel in spaghetti( Zer brand), granule, Zer brand with concentration reached to 4.34 ppm and 1.06 ppm respectively.
The results of cereals group and its products show that two kinds of fungi, Aspergillus spp. and Penicillin spp. were found in rice (Mahmood brand) with numbers got to 1.5×103 Colony Forming Unit/ gram (c.f.u./g),while Bacillus cereus and Staphylococcus aureus were isola

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Organizational Tactics An Approach to Strategic Agility A field study in a sample of mobile operators in Iraq
...Show More Authors

The current research dealt with the issue of organizational skillfulness as an entry point to reach strategic agility. The study has been tested in Iraq's mobile operators - Asia Cell, Zain Iraq and Cork Telecom. The study was applied to a sample of (93) managers distributed at various levels of management (board members, general managers, commissioners, department managers, people managers, unit managers, office managers). The survey used the questionnaire as a key tool for collecting data and information as well as personal interviews. It has sought to test a number of hypotheses related to correlation and influence relationships between the variables of the study, in order to answer the questions related to the problem of stud

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jun 20 2025
Journal Name
Bulletin Of The Iraq Natural History Museum
A NEW RECORD OF TWO NEMATODES, MESORHABDITISFRANSENI FUCHS, 1933 (MESORHABDITIDAE) AND PRATYLENCHUSGOODEYI SHER AND ALLEN, 1953 (PRATYLENCHIDAE) WITH MOLECULAR DESCRIPTION FROM IRAQ
...Show More Authors

rhabditid Mesorhabditis franseni Fuchs, 1933 (Family, Mesorhabditidae) and pratylenchid nematode Pratylenchus goodeyi Sher and Allen, 1953 (Family, Pratylenchidae). They were illustrated by molecular aspects. All specimens of both genera were cultured and reproduced for DNA extraction. M. franseni (IRQ.ZAh2 PP528819.1 isolate) was characterized. P. goodeyi (IRQ.ZAh5 PP535537 isolate) was also characterized. Selected specimens of these two species were molecularly characterized using the partial ITS-rRNA gene sequences. The ITS-rRNA sequence of IRQ.ZAh2 PP528819.1 isolate had a range of (98.62%-100%) sequence homology with ITS-rRNA sequence of M. franseni available in NCBI database. While, the ITS-rRNA sequence of IRQ.ZAh5 PP535537 isolate h

... Show More
Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref