Preferred Language
Articles
/
jperc-1519
Job Satisfaction for Educational Counselors: General Directorate of Education Rusafa II
...Show More Authors

The current research aims to measure the job satisfaction of educational counselors in the general directorate of education of the second Rusafa in the ministry of education of Iraq. Moreover, it aims to identify the significant differences in job satisfaction according to the gender (Male-Female), the length of service (less than 15 years more than 15 years), and the relationship between these two variables. To achieve the objectives of the research, the researcher developed a scale to measure job satisfaction. This tool was applied to sample of (100) educational counselors selected randomly. The results showed that educational counselors have job satisfaction, in which males are more satisfied in their job than females. The results also showed that educational counselors with a job service more than 15 years are more satisfied to their peers in a service less than 15 years. The researcher came out with a number of conclusions, recommendations, and suggestions

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 01 2013
Journal Name
Journal Of Mathematical Analysis And Applications
Strong duality for generalized monotropic programming in infinite dimensions
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
The best interpolation methods for evaluate water table pollution
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Energy Calculation for Excited Lithium Atom in Position Space
...Show More Authors

The energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Mon Nov 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Proposed emerged and enhanced routing protocols for wireless networks
...Show More Authors

The problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Al-nahrain Journal Of Science
Modified third order iterative method for solving nonlinear equations
...Show More Authors

Many numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.

Publication Date
Mon Jul 28 2025
Journal Name
Applied Physics Letters
Theoretical defect engineering in AgBiI4 for enhanced photovoltaic performance
...Show More Authors

Silver-bismuth iodide (ABI) ternary semiconductors, such as AgBi2I7, AgBiI4, Ag2BiI5, and Ag3BiI6, have emerged as promising lead-free light absorbers for photovoltaic applications due to their favorable optoelectronic properties. Despite recent advances that have improved power conversion efficiencies from ∼1% to over 5%, ABI-based solar cells still show substantial open-circuit voltage (VOC) losses of up to ∼1 V, which significantly hinder the device performance. These losses have been experimentally attributed to the non-radiative recombination originating from intrinsic defects, however, theoretical understanding of these defect mechanisms remains limited. Here, using density functional theory calculations, we systematical

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat May 19 2012
Journal Name
Wireless Personal Communications
Stable-Aware Evolutionary Routing Protocol for Wireless Sensor Networks
...Show More Authors

Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (19)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref