The research aims to determine the role of training strategy dimensions of (trainers، curriculum training programs، trainees and their desire for training، administrative and supervisory services and their impact on the success of the training program) in the entrepreneurial performance of the organization dimensions of (pre-planning، renovation and modernization، efficiency، effectiveness)، so search ranks of great importance because it addresses an important and modern issue in performance entrepreneurial، and strategy training، aware of the importance of the subject and expected outcomes (General company for electrical Industries - motor plant) surveyed، was an analysis of data obtained through field visits in addition to the q
... Show MoreIn this study, the fission track registration technique with the CR-39 detector are using to determination the uranium concentrations for seventeen samples of teeth distributed in four districts in Baghdad City .Five samples taken from both Al-Durra District and Al-Jadiriyia District, Four samples taken from Al-Karrda (Alaatar street) Taken four samples and three samples taken from Al-Zuafrania and by 0.5gm in weight and 1.5 mm in thickness. The uranium concentrations in teeth samples measured by using fission tracks registration in (CR-39) track detector that caused by the bombardment of (U) with thermal neutrons from (241 Am-Be) neutron source that has flux of (5 ×103 n cm-2 s-1). The concen
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
Geotechnical engineering like any other engineering field has to develop and cope with new technologies. This article intends to investigate the spatial relationships between soil’s liquid limit (LL), plasticity index (PI) and Liquidity index (LI) for particular zones of Sulaymaniyah City. The main objective is to study the ability to produce digital soil maps for the study area and determine regions of high expansive soil. Inverse Distance Weighting (IDW) interpolation tool within the GIS (Geographic Information System) program was used to produce the maps. Data from 592 boreholes for LL and PI and 245 boreholes for LI were used for this study. Layers were allocated into three depth ranges (1 to 2, 2 to 4 and 4 to 6)
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
Recently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural
... Show MoreIn 2010, the tomato leaf miner Tuta absoluta (Meyrick, 1917) was reported for the first time in Iraq. The larvae can feed on all parts of tomato plants and can damage all the growth stages. The main host plant is tomato, Lycopersicon esculentum, but it can also attack other plants in Solanaceae family. In this study it was found attacking alfalfa plants, Medicago sativa in Baghdad Province. This finding reveals that alfalfa also serves as a host plant for T. absoluta in Iraq.
A geographic information system (GIS) is a very effective management and analysis tool. Geographic locations rely on data. The use of artificial neural networks (ANNs) for the interpretation of natural resource data has been shown to be beneficial. Back-propagation neural networks are one of the most widespread and prevalent designs. The combination of geographic information systems with artificial neural networks provides a method for decreasing the cost of landscape change studies by shortening the time required to evaluate data. Numerous designs and kinds of ANNs have been created; the majority of them are PC-based service domains. Using the ArcGIS Network Analyst add-on, you can locate service regions around any network
... Show More