Preferred Language
Articles
/
zRf0TpIBVTCNdQwCjqoV
Analytical study of the reality of the application of administrative automation in sports clubs
...Show More Authors

The primary objective of this study was to identify the obstacles and problems encountered in the work of sports clubs according to the reality of the application of administrative automation. The present study was conducted in the sports club headquarters of Baghdad within the timeframe of October 2021 to December 2021. In the present study, a descriptive approach was used by the researchers in an analytical style according to the nature of the problem to be studied. The research community of the current study was composed of 100 sports clubs in the governorate of Baghdad. A total of 80 questionnaires were filled by the sample participants, who represented a percentage of 80% of the research community. After processing the results statistically using the SPSS software, the researchers concluded that sports clubs encounter a lot of difficulties regarding delay in implementing automation procedures in their administrative work, due to lack of financial allocations and lack of awareness among club workers regarding automation techniques.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Community Detection in Modular Complex Networks Using an Improved Particle Swarm Optimization Algorithm
...Show More Authors

     Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem.  In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a local

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
CdSe/CdS core/shell in polyacrylamide polymer matrix for Quantumdots Luminescent solar concentrator
...Show More Authors

Luminescent solar concentrator (LSC) are used to enhance       photoresponsivity of solar cell. The Quantumdots luminescent solar concentrator (QDLSC) consists of CdSe/CdS core/shell nanoparticles embedded in polyacrylamide polymer matrix positioned on the top surface of the silicon solar cell. This procedure improves the conversion efficiency of the bare silicon solar cell. The conversion efficiency of the solar cell has increased from 7.3% to 10.3%.  this improvement is referred to the widening of the response spectral region window  of the a- Si. Solar cell.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Jordon: Al-ahliyya Publishing House
Unity in diversity: Interfaith Dialogue(translated into Arabic), Jordon: Al-Ahliyya Publishing House.
...Show More Authors

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Dec 20 2023
Journal Name
Discourse And Interaction
Refusal and politeness strategies favoured among Iraqi and Malaysian learners in marriage proposals
...Show More Authors

The study targets exploring the similarities and differences between Iraqi and Malaysian learners of English in refusing marriage proposals. Also, it examines the favored politeness strategies that learners use to protect their interlocutors’ face, heeding both their social distance and status. Data were gathered by a Discourse Completion Task (DCT) which contained six marriage situations. Responses were analyzed based on Beebe et al.’s (1990) refusal taxonomy and Scollon et al.’s (2012) politeness system. The findings indicated that both the Iraqi and Malaysian learners preferred the indirect refusal strategies in marriage proposals, as well as the hierarchical politeness in the form of independence strategies regardless of t

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Charge Transfer Between d-p States in Ti02 By Employing Compton Scattering Techniques
...Show More Authors

The com pton profiles for Ti02 have been measured using a SCi

Am-241 compton spectrometer .A pellet of the oxide was prepared from a polycrystalline powder    having a thickness of 1.54 mm ,about J 00000  counts   have   been  accumulated   at   the  compton   peak

.Theoreti cal compton profiles have been calculated for different ionic anangements using free atom compton profile for the core electrons.The   theoretical  and  experimental  results  ahrce  well  for (Ti/4(0 .2    arrangement which support complete transfer of valence electrons from metal to oxygen ions, i.e., full ionic &nbs

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
OPEN CIRCUIT HEAT EXCHANGER DYNAMICS DURING FLOW REDUCTION TRANSIENT IN THEIR SECONDARY LOOPS
...Show More Authors

An experimental and theoretical analysis was conducted for simulation of open circuit cross flow heat
exchanger dynamics during flow reduction transient in their secondary loops. Finite difference
mathematical model was prepared to cover the heat transfer mechanism between the hot water in the
primary circuit and the cold water in the secondary circuit during transient course. This model takes under
consideration the effect of water heat up in the secondary circuit due to step reduction of its flow on the
physical and thermal properties linked to the parameters that are used for calculation of heat transfer
coefficients on both sides of their tubes. Computer program was prepared for calculation purposes which
cover a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FIRST OBSERVATIONS ON Phrynocephalus maculatus longicaudatus Haas, 1957 (SQUAMATA: SAURIA: AGAMIDAE) IN IRAQ
...Show More Authors

    The present paper confirmed the presence of Phrynocephalus maculatus longicaudatus Haas, 1957 in Iraq and recorded the first observations of this taxon in Al-Muthanna province southwestern of Iraq. The existence of the species is yet uncertain in Iraq. The habitat and morphological characteristics of this species were reviewed.

View Publication Preview PDF
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Creeds in Assyrian Sculpture: جبــــــــــار محمـــــــــــــود حسين العــــــبيدي-حسام عبد الخالق عثمان الطائي
...Show More Authors

The research covered Creeds in Assyrian Sculpture

 (Assyrian Sculptures) The ability of the Assyrian sculptor to

 contrast these creeds and tendon in Assyrian sculpture, in various variations, including prominent and stereotypical plaques and winged bulls, in addition to the obelisks and hunting scenes of the Lionسion hunting scenes of the black                                                               

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref