Preferred Language
Articles
/
FxbSCocBVTCNdQwCOzIy
Design and Implementation of a Scalable RFID-Based Attendance System with an Intelligent Scheduling Technique
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A Study of the Structural and Optical Properties of SnS:F prepared by chemical spray pyrolysis technique
...Show More Authors

Thin films of pure tin mono-sulfide SnS and tin mono-sulfide for (1,2,3,4)% fluorine SnS:F with Thicknesses of (0.85 ±0.05) ?m and (0.45±0.05) ?m respectively were prepared by chemical spray pyrolysis technique. the effect of doping of F on structural and optical properties has been studied. X-Ray diffraction analysis showed that the prepared films were polycrystalline with orthorhombic structure. It was found that doping increased the intensity of diffraction peaks. Optical properties of all samples were studied by recording the absorption and transmission spectrum in range of wave lengths (300-900) nm. The optical energy gap for direct forbidden transi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Design and Testing a Neutrons and Gamma-Rays Multilayer Shield Using Different Groups of Cross – Sections
...Show More Authors

A preventing shield for neutrons and gamma rays was designed using alternate layers of water and iron with pre-fixed dimensions in order to study the possibility of attenuating both neutrons and gamma-rays. ANISN CODE was prepared and adapted for the shield calculation using radiation doses calculation: Two groups of cross-section were used for each of neutrons and gamma-rays that rely on the one – dimensional transport equation using discrete ordinate's method, and through transforming cross-section values to values that are independent on the number of groups. The memory size required for the applied code was reduced and the results obtained were in agreement with those of standard acceptable document samples of cross –section, this a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 21 2018
Journal Name
International Journal Of Control, Automation And Systems
Design and Stability Analysis of a Fractional Order State Feedback Controller for Trajectory Tracking of a Differential Drive Robot
...Show More Authors

View Publication
Scopus (20)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets
...Show More Authors

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Project Planning & Scheduling: بحث تطبيقي لمشاريع / مديرية الابنية المدرسية /دائرة المشاريع /مشروعالوزارةرقم (1)
...Show More Authors

Construction project life-cycle processes must be managed in a more effective and predictable way to meet project stakeholder needs , However, there is increasing concern about whether know-how effectively improves  understanding of underlying theories of project management processes for construction organizations and their project managers  Project planning and scheduling are considered as key and challenging tools in controlling and monitoring project performance , but many worldwide construction projects appear to give insufficient attention to effective management and definition of  project  planning, including pre planning stages . Indeed, some planning issues indeed, some planning issues have been completely ove

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Optical Fiber Technology
A novel modified fiber Bragg grating (FBG) based ammonia sensor coated with polyaniline/graphite nanofibers nanocomposites
...Show More Authors

View Publication
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Implementation of Total Productive Maintenance (TPM) for industrial establishments and their impact on operational strategy: applied research in a sample of industrial companies
...Show More Authors

The aim of the research is to measure the relationship and effect of the application of total production maintenance TPM in the operational strategy, as it is considered one of the most important strategies for the process of restoring production losses because of inefficient equipment. Competitive edge in the global market by upgrading the operational strategies of OS in the application of TPM in those institutions that apply both H-OS-oriented and P-OS-oriented strategies where the strategy has been identified as a critical success factor. The aim of this study is to attempt to consider the application of comprehensive productive maintenance in industrial establishments

View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Formal questioning and its representations in the design of contemporary residential rooms for children with autism
...Show More Authors

The formal investigation of the interior spaces of the residential bedrooms for children with autism is one of the basic tasks that should be known by the interior designer. Achieving an atmosphere compatible with his health condition, which contributes to generating a sense of spatial intimacy through the design dimension provided by the interior designer and his tireless endeavor to meet the needs of the child in an internal environment that achieves the functional dimension and spiritual approaches that enhance the child’s sense of spatial belonging and contribute to improving his mood and this positively reflects on his behavior and social integration. The current research has reached the most important design criteria that must be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
The Effect Irrigation Scheduling and Potassium Fertilization on Water Consumption of Potato (Solanum tuberosum L.) Under Modern Irrigation Systems
...Show More Authors

A field experiment was conducted in Yusufiya sub-district - Mahmudiya township/Baghdad governorate in silty loam texture soil during the spring season of 2020. The experiment included three treatments with three replicates, as the Randomized Complete Block Design (RCBD) was used according to the arrangement of the split design block. The treatments are in the irrigation system, which included surface drip irrigation (T1) and sprinkler irrigation (T2). Secondly, the Irrigation levels including the irrigation using 0.70 Pan Evaporation Fraction PEF (I1), irrigation using 1.00 PEF (I2), and irrigation using 1.30 PEF (I3). Coupled with, Pota

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.