Preferred Language
Articles
/
jcoeduw-233
Suspicion in the truth that the satisfaction of the student in the criticism of the speech of the poet and the writer to I bin Al-Atheer
...Show More Authors

Suspicion in the truth that the satisfaction of the student in the criticism of the speech of the poet and the writer to I bin Al-Atheer

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تقويم قانون الخدمة الجامعية رقم 23 لسنة 2008 وأثره في تقليل مظاهر الفساد الإداري والمالي: دراسة تحليلية قدية لنصوص القانون وتطبيقاته
...Show More Authors

This research includes an analytical and critique study for the version of the University Service Law No.23 for the year 2008, containing all its aspects and failure whether in its legislation or its applications.

View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
مجلة علوم الرياضة في جامعة ديالى
إتخاذ القرار و علاقته بإنماط الشخصية و الإدراك البنائي لدى مدراء منتديات الشباب و الرياضة في محافظات الفرات الأوسط و الجنوبية.
...Show More Authors

Publication Date
Wed Jun 30 2010
Journal Name
المجلة السياسية والدولية
الدور الاقليمي العراقي :رؤية في الثوابت الاستراتيجية والتحديات المستقبلية :دراسة استشرافية للدور الاقليمي العراقي ومقوماته الاستراتيجية والاقتصادية والسياسية الفرص المتاحه والقيود
...Show More Authors

يناقش البحث المقومات المادية والمجتمعية والموضوعية للدور الاقليمي العراقي بعد العام 2010 والفرص المتاحة والقيود التي تحد منه والافاق المستقبلية لهذا الدور في ظل بيئة اقليمية تسودها منظومات تحالف متناقضة في الاهداف والاستراتيجيات

View Publication Preview PDF
Publication Date
Sun Oct 04 2020
Journal Name
وزارة التخطيط/الجهاز المركزي للتقييس والسيطرة النوعية
تحضير وتشخيص ودراسة نظرية وتجريبية لتثبيط تأكل سبيكة الفا- براص في ماء البحر ‏بفعل مثبط تأكل جديد مشتق من 2-امينوبينزوثايوزول
...Show More Authors

يهدف البحث إلى تحضير سلسلة من معقدات العناصر الانتقالية ثنائية التكافؤ(المنغنيز, الكوبلت, النيكل, الخارصين ‏والكادميوم) مع المركب الجديد(‏KL‏) والمشتق من تفاعل ثنائي كبريتيد الكاربون و المركب الوسطي (‏HD‏). شخصت ‏المعقدات ذات الصيغة العامة[‏M(L)2‎‏] بواسطة طيف الرنين النووي المغناطيسي البروتوني والكربوني للمركب الجديد ‏وقياسات الأشعة تحت الحمراء والطيف الإلكتروني ودرجات الانصهار و التوصيلية المولارية و ت

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Diyala Journal For Pure Sciences
Synthesis, Characterization and Biological Activity for Complexes VO(II), Mn(II), Co(II) and Ni(II) With New Multidentate Ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4- ylimino)acetic Acid][H2L] type (N2).
...Show More Authors

In this work, the precursor [2-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid] was synthesised from 4-aminoantipyrine and glyoxylic acid, this precursor has been used in the synthesis of new multidentate ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid][H2L] type (N2O2). The ligand was refluxed in ethanol with metal ions [VO(II), Mn(II), Co(II) and Ni(II)] salts to give complexes of general molecular formula:[M(H2L)2(X)(Y)].B, where: M=VO(II), X=0, Y=OSO3-2, B=2H2O; M=Mn(II),Co(II) ,X=Cl, Y=Cl, B=0; M=Ni(II), X=H2O, Y=Cl, B=Cl. These complexes were characterised by atomic absorpition(A.A), F.T-I.R., (U.V-Vis)spectroscopies (1H,13C NMR for ligand only), alon

... Show More
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Branch and Bound Algorithm with Penalty Function Method for solving Non-linear Bi-level programming with application
...Show More Authors

The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.

View Publication
Crossref
Publication Date
Fri Apr 14 2017
Journal Name
Mechanical Engineering
Testing a Locally Assembled Combine Implement Used for Open Furrow, Planting and Fertilizing under Different Machinery Unit Speeds
...Show More Authors

Preview PDF
Publication Date
Mon Nov 15 2021
Journal Name
Aip Conference Proceedings
Oil skimming followed by coagulation/flocculation processes for oilfield produced water treatment and zero liquid discharge system application
...Show More Authors

The study focused on the treatment of real oilfield produced water from the East Baghdad field affiliated to the Midland Oil Company (Iraq) using an oil skimming process followed by a coagulation/flocculation process for zero liquid discharge system applications. Belt type oil skimmer was utilized for evaluating the process efficiency with various operating conditions such as temperature (17-40 °C) and time (0.5-2.5 hr.). Polyaluminum chloride (PAC) coagulant and polyacrylamide (PAM) flocculant was used to investigate the performance of the coagulation/flocculation process with PAC dosage (5-90 ppm) and pH (5-10) as operating conditions. In the skimming process, the oil content, COD, turbidity, and TSS decreased with an increase in tempera

... Show More
View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Applied Surface Science
Sol-gel derived ITO-based bi-layer and tri-layer thin film coatings for organic solar cells applications
...Show More Authors

View Publication
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF