Preferred Language
Articles
/
A4aOT4YBIXToZYALMIK7
Cloud Computing Adoption by Higher Education Institutions of Iraq: An Empirical Study
...Show More Authors

In the last years, a new technology called Cloud computing has been developed. Empirical and previous studies, commonly examined in business field and other domains. In this study, the significant factors that affecting the adoption of cloud computing have been examined using a frequency analysis that have been explored by the previous studies. The results showed that the most effected factors were relative advantage which followed by security and privacy, complexity, innovativeness, and external support. In this study the model of technology organization-environment was used to examine the significant factors that affecting the adoption of cloud computing.

Publication Date
Thu Mar 10 2022
Journal Name
Alustath Journal For Human And Social Sciences
Cognition Construction of First Language of Translator ‎Education in Iraq: A Correlation Study
...Show More Authors

The majority of Iraqi translator-student have problems at two main levels: the conceptual level and the productive level. From different perspectives, such problems are either related to ‘language’ or to ‘cognition’. This binary view is an indication to the implicit and interchangeable relationship between language and cognition. The relationship between cognition language and translator starts with the first language and its effect on the Iraqi translators. Identifying the effect is the aim of the present study. It is hypothesized that Iraqi students are negatively influenced by the problems and weaknesses of first language schema. This reflects the major claim and later concludes that first language instruction in the Iraq

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Effect of The Tax Core Competencies in The Tax Settlement: An Empirical Study of The General Commission for Taxes
...Show More Authors

This Study Sought to Determine The Relationship and Impact Between The Tax Core Capabilities and Tax Settlement The Study Took Place in The Tax Administration, and Based The Problem Was to Two Hypotheses As Solutions Initial Mocked Content to Explain The Relationship Between The Phenomena, and to Test The Validity of Assumptions And Due To The Fact That The General Authority for Taxes is The Body for The Advancement of The Collection Tax In Iraq Random Sample Was Selected to Represent The Population of The Study, Since The Sample Included 22 Individuals Representing 70% of The Total Community to Study, Represented by The Director General, Agents and Directors of Departments and Branch Managers Managers Working in The General Authority fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Internal Islamic Certificates of Deposit (ICD) on the Profitability of Islamic Banks: an Empirical Research in Asia-Iraq Islamic Bank
...Show More Authors

 As long as Islamic banks cannot operate in an environment that deals with traditional banking instruments based on the interest rate (bank interest) that is prohibited by Article No. (6) of the Islamic Banking Law No. (43) of 2015 which stipulates that (do not deal in any activity that carries Interest (neither taking nor giving)). Therefore it seeks to provide an alternative strategic solution within the framework of the provisions and rules of Islamic Sharia, on the basis of participating in profit and loss to avoid the method of interest taking and giving, to find investment methods to provide new financial products, such as Islamic certificates of deposit and investment funds according to the method Murabaha, speculation (Mudar

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Craniomaxillofacial Trauma & Reconstruction
Mandibular Fractures in Iraq: An Epidemiological Study
...Show More Authors

The purpose of this study was to evaluate the epidemiological characteristics of the mandibular fractures relating to gender, age, the etiology of injury, and the rendered treatment modalities and complications. The data of the patients who sustained mandibular fractures were retrieved and were analyzed retrospectively, and based on these data a descriptive analysis was conducted. A total of 112 patients were included in this study; the most common cause was road traffic accidents (RTAs) followed by assaults and missile injuries. The most frequently involved age group was 11 to 20 years, treatment modalities included conservative, closed reduction and indirect fixation, and open reduction and internal fixation (ORIF) in 11.6, 79.5, and 8.9%

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Feb 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Tax penalties and their effectiveness in reducing the creative accounting practices: An Empirical Study of the General Commission for Taxes
...Show More Authors

The research aims to study and definition of the concept of creative accounting and motives adopted by the management of companies to achieve their own goals and their impact on the reliability of the financial statements and the tax settling accounts and whether that tax administration is able to detect and limit the creative accounting practices and impose legal sanctions deterrent against companies The research has come to a set of conclusions, including:

  1. The administration motives in the use of creative accounting methods, some internal motives related to the interests of the administration in maximizing profits to increase incentives and rewards, others are external, such as the impact on stock prices or reduce the am

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
An Evolutionary Algorithm for Task scheduling Problem in the Cloud-Fog environment
...Show More Authors
Abstract<p>The rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environme</p> ... Show More
View Publication
Scopus (10)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Al-mustansiriyah Journal Of Science
Study of Photons Emission Rate of Quark-Antiquark at Higher Energy
...Show More Authors

In this paper, the dynamic of quark and anti-quark interaction has been used to study the production of photons in the annihilation process based on the theory of chromodynamic. The rate of the photon is to be calculated for charm and anti-strange interaction c→γg system with critical temperature 113 and 130 MeV and photon energy GeV/c. Here the critical temperature, strength coupling and photons energy are assumed to be affected dramatically on the rate of photons emission of state interaction c, which can form gluon possible structures and photon emission state. The decreased photons emission yields with increased strength couple of quarks reaction due to increase critical temperature from 113 MeV to 130 MeV were predicted. We

... Show More
View Publication
Crossref (2)
Crossref