Preferred Language
Articles
/
abaa-912
Municipality of Baghdad’s communication means and methods during imposing the law operations
...Show More Authors

This study aims at  identifying  how Baghdad Municipality employs public relations in law enforcement operations and the role played by the Municipality in communication and communicating with the public, raising their awareness and educating them to not  abuse public property.  As for the research tools, the researcher used the questionnaire as a data  collection tool in addition to an analytical description of the means and methods of communication for public relations on  Baghdad Municipality Facebook page.

The research comes out with a set of result; the most important of which are:
The means through which citizens learned about the existence of campaigns to impose the law an eliminate violations were social media platforms; they got the highest percentage among other means.

emissions of the Public Relations Office of the Law Enforcement Plan (such as educating people to not violate public and private properties) were the highest among the rest of other missions.
White citizens continued tracking the activities and works of the Public Relations Offices of Baghdad Municipality’s directorates, which helped them, increase their own information, the question (media channels and social networking platforms played a major role in educating people to not violate public properties) got the highest percentage.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Bayes and Non-Bayes Estimation Methods for the Parameter of Maxwell-Boltzmann Distribution
...Show More Authors

In this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu May 02 2019
Journal Name
Journal Of Planner And Development
ways to employ planning and architectural methods to rationalize the introduction of electricity
...Show More Authors

the rationalization of energy consumption Require awareness in the possibility of bridging the local need severe shortage of electric power for daily requirements. The research aims to show that the engineers of various specializations and architects, including in particular can have an active role in about the importance of the role of energy in human life, and it’s best utilization without extravagance (which our religion forbids it). Here lies the problem of the research to find possible means and alternative methods to reduce (rationalization) electrical energy consumption in hot dry areas in general which need large energy for air conditioning because of the crucial climate of these regions that making access to the area o

... Show More
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Application of Groebner Bases to Study a Communication System
...Show More Authors

This paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jun 07 2021
Journal Name
Journal Of Molecular Histology
Structural and functional relations between the connective tissue and epithelium of enamel organ and their role during enamel maturation
...Show More Authors

View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon May 18 2026
Journal Name
Journal Of Physical Education
Using Compound Exercises (Skill) with Auditory and Visual Means And Their Effect on Some Fundamental Skills In Futsal For Women
...Show More Authors

View Publication
Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
Toxoplasmosis: Serious disease during pregnancy
...Show More Authors

Toxoplasmosis is an infection caused by Toxoplasma gondii that leads to abortion or hydrocephalus during pregnancy.One hundered and twenty two aborted women were selected for this study. Serum samples were collected form Al-Kadhmia and Kamal Al-Samari Hospitals,and laboratories around Baghdad, and tested for specific IgG and IgM anti-toxoplasma antibodies to confirm toxoplasmosis in those women by using ELISA test.The result recorded that 51(41.8%) women had antibodies against Toxoplasma gondii, 25(59.5%) women were positive for IgG, and 17(40.5%) women were positive forIgM, while 9(17.6%)women were positive for both.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Comparative Effects of Fentanyl, Medazolam, Lignocaine and Propranolol on Controlling the Hemodynamic Pressor Response during Laryngoscopy and Intubation
...Show More Authors

Laryngoscopy and tracheal intubation are considered the most invasive stimuli in anesthesia. They provoked cardiovascular responses that include hypertension, tachycardia and dysrhythmias. Various pharmacological approaches have been used to blunt or attenuate such pressor responses. The present study was designed to evaluate the effect of medazolom, lignocaine and propranolol as a valuable adjuvant to fentanyl in attenuating hemodynamic responses to endotracheal intubation in normotensive patients. Thirty two patient with physical status I or II according to the score of American Society of Anesthesiologist (ASA), scheduled for elective surgery under standard general anesthesia, were randomly allocated into four groups (8 patients in ea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2023
Journal Name
اكليل للدراسات القانونية
اساس المسؤولية المدنيةعن الربوتات دراسة في القانون والفقة الاسلامي
...Show More Authors