Preferred Language
Articles
/
VxcLgpIBVTCNdQwCTLI_
Assessment of Antimicrobial Sensitivity of Bacterial Pathogens Isolated from Post-Cesarean Surgical Site Infection of Patients in Al-Elwiyah Maternity Hospital
...Show More Authors

Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Waterpipe Smoking Effect on Clinical Periodontal Parameters, Salivary Flow Rate and Salivary pH in Chronic‎ Periodontitis Patient
...Show More Authors

Publication Date
Sat Jan 03 2026
Journal Name
Journal Of Physical Education
Unbalanced Strength Exercises Using Designed Tools and Their Effects on Some Biomechanical Variables in Young 110m Hurdles
...Show More Authors

View Publication
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using Tools Lean Accounting to Reduce the Costing: An Applied Research in General Company for Electric Industry
...Show More Authors

The developments accelerated in technology and rapid changes in the environment and increase numbers industrial countries and different desires and requirements of customers, lead to be produced in large quantities is not feasible due to changes listed above as well as the need to product variety and change in tastes and desires of consumers, all above led not to enable companies to discharge their products in the case of mass production and created the need to devise ways and new methods fit with the current situation, and accounting point no longer the traditional accounting systems able to meet the requirements needed by the companies to make decisions and know where waste and loss of resources resulting to invent new style away from

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Applying Cognitive Methodology in Designing On-Line Auto-Tuning Robust PID Controller for the Real Heating System
...Show More Authors

A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Collaboration And Integration In Construction, Engineering, Management And Technology
A Hybrid Conceptual Model for BIM Adoption in Facilities Management: A Descriptive Analysis for the Collected Data
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sun Oct 27 2024
Journal Name
Journal Of Economics And Administrative Sciences
An Integrated Approach to Constraints Theory and Fuzzy Analytical Hierarchy Process (FAHP) in Construction Projects (Case Study)
...Show More Authors

The research endeavors to harness the benefits stemming from the integration of constraint theory into construction project management, with the primary goal of mitigating project completion delays. Additionally, it employs fuzzy analysis to determine the relative significance of fundamental constraints within projects by assigning them appropriate weights. The research problem primarily revolves around two key issues. Firstly, the persistent utilization of outdated methodologies and a heavy reliance on workforce experience without embracing modern computerized technologies. Secondly, the recurring problem of project delivery delays. Construction projects typically encompass five fundamental constraint types: cost restrictions, tim

... Show More
Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Suggested Procedures According To COSO Integrated Framework To Evaluate The Internal Control System In Iraqi Oil Companies
...Show More Authors

The research amid to measure the extent of the Suggested procedures of the internal control in accordance with the updated COSO framework in improving the procedures for internal control work in Iraqi oil companies. As the research problem was represented in suggesting procedures for internal control according to the updated COSO framework and finding out the relationship of correlation and influence between the suggested procedures and the internal control procedures that are done in the Iraqi oil companies. The research followed the quantitative approach to handling and analysing data by designing a Questionnaire to represent the research tool for collecting data. The study population was represented in the Iraqi oil companies,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
Ethical Behavior and its Relationship to Social Media Uses among Female Students at Preparatory Schools in Baghdad
...Show More Authors

The current study aims to assess the ethical behavior among female students who are using a social media network in addition to describe the variables of interest (social media use and ethical behavior) among participants, in which to find out the effects of social media on the ethical behavior of high school female students. A quantitative approach was adopted to collect the relevant data for the study, six schools included in this study from the six directorates of education in Baghdad city. Subsequently, SPSS software was applied to analyze the relevant data of the study. To achieve the research objectives, a questionnaire was composed of three sections: Part I: deals with the student's demographic information. Part II: deals with inf

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2022
Journal Name
Journal Of The College Of Languages (jcl)
Construction Grammar in Kurdish Language: ڕێزمانی بونیادنان لە زمانی کوردیدا توێژینەوەیەکی هەڵهێنجراو(مستل)ە لەنامەی دکتۆراوە وەرگیراوە
...Show More Authors

This research is under the title (Construction Grammar in the Kurdish language), which in turn is an attempt to present grammar and Kurdish grammar from the perspective of the constructive of Cognitive Linguistics. The construction as a term in the Kurdish language base was not recent, as it was discussed in other schools in a specific way from the perspective of language schools, but the subject of construction with a perceived background includes specific purposes, which is how to build the linguistic base by being a template accessible to its speakers, and in the cases of speaking it, not to mention how it is perceived and the level it is familiar with by its speakers. The nominal purpose of the Construction is Unification of form-mea

... Show More
View Publication Preview PDF
Crossref