Preferred Language
Articles
/
rhdnso8BVTCNdQwCsnww
Training between reality and aspiration raising from the point of view of second lieutenant and supervisor of physical education lesson
...Show More Authors

First: the definition searchEnsure the definition Introduction of research and its importance, as it was addressed to the importance of the importance of training in the development of people and institutions and the importance of diversifying the training vocabulary and a lot of relevant courses for its role to develop work and get away from the routine work, and was put up for the importance of research to identify the problems and obstacles facing the process of providing training as the best in order to access to the ambition sought by workers on training and even the trainees while defined research problem that was observed weak performance and cost-effective training through the study of some of the questionnaires distributed by the department to evaluate the courses, in spite of the large number of courses and variety we still hear from the participants complained of re vocabulary session and the lack of information and lack the practical side, sometimes up complaining about the weakness of the person on trainingThe objectives of the research:- Understand the fact the training in the education of Baghdad's Karkh II from the perspective of the participants.- Identify what aspires to trainees and what are the problems facing the training.As research identifies the following areas:Human limit: employees of the Directorate of Baghdad Karkh II who attended the sessions during the research period.Temporal limitation: 07/02/2016 to 28/04/2016Reducing spatial: training halls of the Directorate of Education Baghdad Karkh II.Third: Find measures:The researcher used the descriptive approach to composed a sample of (820) trainees from associate to the Directorate of Education Karkh II, who Charcot sessions held during the search, and was relying on scientific sources and references relevant to the subject of research for the purpose of achieving the goals of the research, which has been prepared identifying the four axes of the trainees It was displayed resolution on the experts and they evaluated, and then was an exploratory experience to identify the most important obstacles that may face the researcher and the researcher distributed questionnaires to the trainees during the research period from 07/01/2016 to 28/04/2016, was the use of appropriate statistical methods to the research topic to reach to the minute results.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Viable Strategies to Increase Clinical Trial Patient Diversity
...Show More Authors

In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 27 2024
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 24 2022
Journal Name
Wasit Journal For Pure Science
β*-Regular supra topological spaces
...Show More Authors

Form the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.

Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Strong Differential Sandwich Results for Analytic Functions Associated with Wanas Differential Operator
...Show More Authors

    In this article, we introduce and study two new families of analytic functions by using strong differential subordinations and superordinations associated with Wanas differential operator/. We also give and establish some important properties of these families.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 19 2021
Journal Name
Iraqi Journal Of Science
Strongly Coretractable Modules
...Show More Authors

Let R be a ring with identity and M be a right unitary R-module. In this paper we
introduce the notion of strongly coretractable modules. Some basic properties of this
class of modules are investigated and some relationships between these modules and
other related concepts are introduced. 

View Publication Preview PDF
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
On Soft Turning Points
...Show More Authors

The soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.

View Publication Preview PDF
Scopus (14)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Laser Peening on Aluminum Alloy 7049 Using Black Paint Surface Coating
...Show More Authors

Abstract

Black paint laser peening (bPLP) technique is currently applied for many engineering materials , especially for aluminum alloys due to high improvement in fatigue life and strength . Constant and variable   bending fatigue tests have been performed at RT and stress ratio R= -1 . The results of the present  work observed that the significance of the surface work hardening which generated high negative residual stresses in bPLP specimens .The fatigue life  improvement factor (FLIF)  for bPLP constant fatigue behavior was from 2.543 to 3.3 compared to untreated  fatigue and the increase in fatigue strength at 107 cycle was 21% . The bPLP cumulative fatigue life behav

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 02 2012
Journal Name
Education College Journal/al-mustansiriyah University
On Significance Testimator in Pareto Distribution Via Shrinkage Technique
...Show More Authors

In this paper, preliminary test Shrinkage estimator have been considered for estimating the shape parameter α of pareto distribution when the scale parameter equal to the smallest loss and when a prior estimate α0 of α is available as initial value from the past experiences or from quaintance cases. The proposed estimator is shown to have a smaller mean squared error in a region around α0 when comparison with usual and existing estimators.

Preview PDF