Recently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and service quality play a fulfilling role in ensuring user satisfaction and the PUKMS.
The objective of the research is to identify the efficiency of risk management in various names at Baghdad International Airport in the face of various risks (financial - technical - human - natural ..) facing the sample of the search of the General Establishment of Civil Aviation and the Iraqi Airways Company where the researcher identified the hypothesis that summarizes There is a significant significant correlation between risk management, risk management and risk review and assessment. The researcher used the means of research from observation and interviews with the relevant officials in this field, as well as used the questionnaire and distributed a sample of 170 employees in the field of risk management (SMS Department) in Iraqi A
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreBringing about urban, economic, and social changes in rural areas similar to those occurring in urban areas aims to reduce urban-rural disparities by providing services in those areas, decentralizing the management of these services, expanding citizen participation in local governance (decentralized administration), and achieving comprehensive development, developing and empowering localities, and keeping pace with new transformations and their impacts on the functions of the center and localities. In fact, the lack of clarity of the role of local government in planning and managing services has hindered development plans, and declined the level of services in rural areas, and has negative
... Show MoreThe objective of the present work was to estimate water requirements and water use efficiency for Broccoli under normal irrigation conditions and sewage irrigation. Field experiment was carried out during the season 2018 at station/Sulaimni agricultural station/Bakrajo –College of Agricultural Sciences. The experiment included three treatments: River water irrigation in all season growth (I1), Sewage water irrigation in all season growth (I2), Alternate irrigation (one river irrigation followed by two sewage water irrigation) in all season growth (I3). The experimental Design was Randomized Complete Block Design (RCBD) w
Tench is a cyprinid fish that has undergone human-induced translocations. The natural populations of the species are on the decline due to habitat loss and spawning grounds degradation. The genetic diversity of seven natural populations was investigated to establish the genetic knowledge base for successful conservation efforts and for selective breeding. Twelve microsatellite markers, the sequencing of a 615 bp section of mtDNA (Cytb) and PCR-RFLP analysis of two nuclear markers (Act) and (RpS7) were used to analyze the genetic variation and structure among 175 individuals. All microsatellite loci were found to have moderate levels of polymorphism. The pairwise Fst values between population pairings were moderate; the populations w
... Show MoreIn this research the change in the distance of the two stars in two binary star systems (13.6+8)M8and (13+10)M8 was studied, through the calculations the value (rate of mass transfer) of the two phases of dynamical stages of mass which are mass loss and mass transfer has been extracted in its own way ,by extracting the value of the value of (the distance variation between the two stars) has been found only in the mass transfer stage by using mathematical model ,in mass loss stage and were calculated from the change and the difference between the values of each at different times of binary star system evolution ,it was found that the maximum values of and are in ma
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThis paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
Wireless channels are typically much more noisy than wired links and subjected to fading due to multipath propagation which result in ISI and hence high error rate. Adaptive modulation is a powerful technique to improve the tradeoff between spectral efficiency and Bit Error Rate (BER). In order to adjust the transmission rate, channel state information (CSI) is required at the transmitter side.
In this paper the performance enhancement of using linear prediction along with channel estimation to track the channel variations and adaptive modulation were examined. The simulation results shows that the channel estimation is sufficient for low Doppler frequency shifts (<30 Hz), while channel prediction is much more suited at
... Show More