Preferred Language
Articles
/
4BcTfZIBVTCNdQwCurGp
The Effect of Emotional Intelligence on Manager Performance: a Field Study in the General Authority for Irrigation and Reclamation Projects in Baghdad
...Show More Authors

Purpose: the purpose of this study is to investigate how managers working for the General Authority for Irrigation and Reclamation Projects react to the impact of Emotional Intelligence (EI) on their performance.   Theoretical framework: The current study includes an intellectual framework on two variables, namely EI and Manager Performance (MP), because it is essential to investigate the relationship between these two variables and the impact of EI on MP.   Design/methodology/approach: The research problem is that a manager's capacity to make wise decisions about their work or interactions with subordinates is diminished when they have inadequate EI. The questionnaire is used as a tool for gathering data for the study, and the statistical program (SPSS.v25) is applied to process the data.   Findings: The findings supported the main hypothesis of the study and demonstrated that positive thinking has a significant and statistically significant impact on self-esteem   Research, Practical & Social implications: that managers work to control their emotions when faced with issues and situations that cause them to become angry, such as those brought on by work pressure or the shortcomings of some subordinates.   Originality/value: There is no study that dealt with the measurement of variables as in our study in the environment of Iraq. Also, the results are considered useful to the study sample company, as they were applied for the first time at the level of variables in the sample examined.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 27 2022
Journal Name
International Journal Of Health Sciences
Heterocyclic compounds-based liquid crystals: Synthesis and mesomorphic properties
...Show More Authors

A series of liquid crystals comprising a heterocyclics dihydro pyrrole and 1,2,3-triazole rings [VII]-[X] were synthesized by many steps starting from a reaction of 3,3'-dimethyl-[1,1'-biphenyl]- 4,4'-diamine with chloroacetyl chloride in a mixture of solutions DMF and TEA to synthesise the compounds [I], then the compounds [I] reacted with malononitrile in 1,4-dioxane and TEA solutions to produce compounds [II], then the first step is repeated with compound [II] where it reacted with chloroacetyl chloride in mixture of DMF and TEA to give compound [III], this compound reacted with sodium azide in the presence of sodium chloride and DMF as solvent to produce the compound [IV], which reacted with acrylic acid by a 1.3 dipolar reaction in sol

... Show More
Preview PDF
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Channel Estimation and Prediction Based Adaptive Wireless Communication Systems
...Show More Authors

Wireless channels are typically much more noisy than wired links and subjected to fading due to multipath  propagation which result in ISI and hence high error rate. Adaptive modulation is a powerful technique to improve the tradeoff between spectral efficiency and Bit Error Rate (BER). In order to adjust the transmission rate, channel state information (CSI) is required at the transmitter side.

In this paper the performance enhancement of using linear prediction along with channel estimation to track the channel variations and adaptive modulation were examined. The simulation results shows that the channel estimation is sufficient for low Doppler frequency shifts (<30 Hz), while channel prediction is much more suited at

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
TV planning and ways to deal with space developments
...Show More Authors

The quote of a Canadian communication scientist (Marshall McLuhan) (“The world has become an electronic village”) has become an archaic information compared to the great and rapid development of communication in the last two decades of the 20th century and what will happen later in the 21st century, to the extent that the world is called, thanks to the internet, a “Small screen” and this fact is a sign of the great progress that has been made in this field. As for the other statement of the Canadian communication scientist mentioned before “the medium itself, is the message”, it has been renewed and developed in its meaning and it’s purpose. Each new technical development in the means of communication necessarily means a me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
Soft Simply Connected Spaces And Soft Simply Paracompact Spaces
...Show More Authors
Abstract<p>We introduce in this paper some new concepts in soft topological spaces such as soft simply separated, soft simply disjoint, soft simply division, soft simply limit point and we define soft simply connected spaces, and we presented soft simply Paracompact spaces and studying some of its properties in soft topological spaces. In addition to introduce a new types of functions known as soft simply <italic>pu</italic>-continuous which are defined between two soft topological spaces.</p>
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Assessing Landsat Processing Levels and Support Vector Machine Classification
...Show More Authors

The availability of different processing levels for satellite images makes it important to measure their suitability for classification tasks. This study investigates the impact of the Landsat data processing level on the accuracy of land cover classification using a support vector machine (SVM) classifier. The classification accuracy values of Landsat 8 (LS8) and Landsat 9 (LS9) data at different processing levels vary notably. For LS9, Collection 2 Level 2 (C2L2) achieved the highest accuracy of (86.55%) with the polynomial kernel of the SVM classifier, surpassing the Fast Line-of-Sight Atmospheric Analysis of Spectral Hypercubes (FLAASH) at (85.31%) and Collection 2 Level 1 (C2L1) at (84.93%). The LS8 data exhibits similar behavior. Conv

... Show More
View Publication
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Synthesis and Characterizationof Some New Phenolic Schiff Bases Derivatives
...Show More Authors

Starting from bis (4,4'-diamino phenoxy) ethan(1), a variety of phenolicschiff bases (methylolic, etheric, epoxy) derivatives have been synthesized. All proposed structure were supported by FTIR, 1H-NMR, 13C-NMR Elemental analysis, some derivatives evaluated by thermal analysis (TGA).

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2017
Journal Name
Ieee Transactions On Cognitive Communications And Networking
Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs
...Show More Authors

In this paper, we investigate and characterize the effects of multi-channel and rendezvous protocols on the connectivity of dynamic spectrum access networks using percolation theory. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from a phenomenon which we define as channel abundance. To cope with the existence of multi-channel, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocols, it becomes difficult for two nodes to agree on a common channel, thereby, potentially remaining invisible to each other. We model this in

... Show More
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
Fuzuli al-Baghdadi, his purposes and his poetic arts
...Show More Authors

This research is mainly about the Arabic poetical work of the poet “Fadhuli AL-Baghdadi ». It aims to show the poetic purposes used like (advice, flirting and praise). This research sheds some lights on how the poetical work was hardly found because it has only one copy, which is originally a transcript

This study analyses AL-Baghdadi's poems, as well as Sheding some lights on earlier life and his other compositions, AL-Baghdadi is considered a tri-lingual poet who wrote in Turkish, Arabic and persian. His Surname as "AL- Baghdadin was as mentioned by some historians, due to his being born in Baghdad or to All a resident in Baghdad at that some poets, who wrote in Arabic have been mentioned here also, like The judge Burhan Al-

... Show More
View Publication Preview PDF