The development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste
... Show MoreThe research aims to measure and analyze the reality of liquidity in the Rasheed Bank and determine their impact on risk and return in order to identify the extent of the efficiency of the management of liquidity by the Bank and how to employ them in a profitable investment areas, and analysis of the compatibility of the liquidity gap and gap the balance sheet (sensitive interest rate) and affected net interest Change prices, and through the adoption of style ladder recommended Meritassets and liabilities by the Central Bank of Iraq, as it is an important and vital aspects in commercial banks' management, when there is a commonly used optimizing the resources of the bank available, it means that there is a banking efficient management is
... Show MoreThe research aims to determine the effectiveness of auditing in light of the relationship between the governance of investment policy and the cost of debt in companies listed on the Iraqi Stock Exchange. The problem of the research is to raise the question about the effect of the governance of investment policy and the cost of debt on the effectiveness of auditing and auditors. During the research, the most important of them were: the existence of an impact relationship on the effectiveness of auditing through the relationship between the governance of investment policy and the cost of debt. The companies listed in the Iraqi Stock Exchange lack an effective proposed guide or framework dealing with the governance of investment policy desp
... Show MoreA Survey Study Of A Sample Of The Public Of Baghdad Governorate
The current study aimed to identify the most prominent psychological and behavioral repercussions of the exposure of the elderly to the news of the Corona pandemic and to determine the mechanisms of their exposure. On an intended sample on both sides of (Al-Karkh and Al-Rasafa) and the simple random sample was adopted to choose the place of distribution of the questionnaire and the intentional sample.
The research concluded several results, most TV news is still a primary source of information and that most of the sample move between stations to see more information about the pandemic and that the presentation of views confuses the elderly ،There
... Show MoreThis study research to Showing The impact of the integration process on the quality of Insurance service and analyze the impact financially to determine whether there is any impact on the quality of the insurance service, in addition to identifying the obstacles that impede the merger between the insurance companies, insurance and the appropriate proposals for its' application and benefit from the benefits achieved.
The importance of The study lies in the fact that it is an important and vital spotlight that is becoming increasingly important in the world to confront the various difficulties and crises that have occurred recently in light of the liberalization of international trade, globalization a
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More