Preferred Language
Articles
/
jcois-570
(Social Reform in the Light of Modern Islamic Thought (Malik bin Nabi model
...Show More Authors

Social reform is the main pillar of the organization of societies. Therefore, all religions and theories were directed to focus on this aspect as the most important element for the development of economic and cultural development. In addition to the analysis and application of the Islamic Sharia, he did not present a theory, but offered real solutions and remedies to the crises in our Arab and Islamic societies alike, despite the criticism directed at him. Z his opinions.

View Publication
Publication Date
Sun Apr 16 2023
Journal Name
Iraqi Journal For Computer Science And Mathematics
Some Methods to Estimate the Parameters of Generalized Exponential Rayleigh Model by Simulation
...Show More Authors

This paper shews how to estimate the parameter of generalized exponential Rayleigh (GER) distribution by three estimation methods. The first one is maximum likelihood estimator method the second one is moment employing estimation method (MEM), the third one is rank set sampling estimator method (RSSEM)The simulation technique is used for all these estimation methods to find the parameters for generalized exponential Rayleigh distribution. Finally using the mean squares error criterion to compare between these estimation methods to find which of these methods are best to the others

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 31 2006
Journal Name
Journal Of Engineering
Theoretical Simulation Of Stress-Strain Relations For Some Iraqiclays Using The Endochronic Model
...Show More Authors

Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Practice of Continuous Auditing in accordance with Technology Acceptance Model: An analytical study of a sample of the Iraqi auditing Offices
...Show More Authors

Abstract

This paper discusses the essence of the developmental process in auditing firms and offices at the world today. This process is focused on how to adopt the audit concepts which is based on Information and Communication Technology (ICT), including the Continuous Auditing (CA) in particular. The purpose of this paper is to design a practical model for the adoption of CA and its requirements according to the Technology Acceptance Model (TAM). This model will serve as a road map for manage the change and development in the Iraqi auditing firms and offices. The paper uses the analytical approach in reaching to the target results. We design the logical and systematic relations between the nine variable

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Probabilistic Model building using the Transformation Entropy for the Burr type –xii Distribution
...Show More Authors

Entropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A model of a proposed audit program to audit the strategies of municipal institutions and its impact on achieving sustainable development: An applied research in the municipal institutions of Karbala Governorate
...Show More Authors

Abstract

                  The study aimed to prepare a practical guide for procedures for auditing the strategies of municipal institutions in achieving sustainable development by adopting the idea of ​​the audit matrix through which a classified report is prepared according to the dimensions of sustainable development, by preparing a specialized audit program for the purpose of auditing strategies for achieving sustainable development and emptying the results of the application of each of the paragraphs The program in the audit matrix that was prepared for the purpose of determining the impact of each observation and linkin

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 22 2020
Journal Name
Collaboration And Integration In Construction, Engineering, Management And Technology
A Hybrid Conceptual Model for BIM Adoption in Facilities Management: A Descriptive Analysis for the Collected Data
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
The dynamical behavior of AIDS and HCV infection model with two modes of transmission
...Show More Authors

The aim of this paper is to describe an epidemic model when two SI-Type of diseases are transmitted vertically as well as horizontally through one population. The population contains two subclasses: susceptible and infectious, while the infectious are divided into three subgroups: Those infected by AIDS disease, HCV disease, and by both diseases. A nonlinear mathematical model for AIDS and HCV diseases is Suggested and analyzed. Both local and global stability for each feasible equilibrium point are determined theoretically by using the stability theory of differential equations, Routh-Hurwitz and Gershgorin theorem. Moreover, the numerical simulation was carried out on the model parameters in order to determine their impact on the disease

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
Evaluation of the Accuracy of Digital Elevation Model Produced from Different Open Source Data
...Show More Authors

This study aims to estimate the accuracy of digital elevation models (DEM) which are created with exploitation of open source Google Earth data and comparing with the widely available DEM datasets, Shuttle Radar Topography Mission (SRTM), version 3, and Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. The GPS technique is used in this study to produce digital elevation raster with a high level of accuracy, as reference raster, compared to the DEM datasets. Baghdad University, Al Jadriya campus, is selected as a study area. Besides, 151 reference points were created within the study area to evaluate the results based on the values of RMS.Furthermore, th

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis
...Show More Authors

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
View Publication Preview PDF
Crossref