Preferred Language
Articles
/
FxcYfZMBVTCNdQwCZtSC
The Effect of Strategic Information System in Global Marketing Channel: A Case Study
...Show More Authors

The research dealt with the issue of strategic information systems and its impact on the global marketing channel. As the research aims to know the strategic information systems used in the cement company. Which support the senior management in supporting decisions taken in the process of global orientation and moving to foreign markets by choosing the marketing channel that will suit the company. Product and competition with it. With other companies' products. The problem of the study focused on how to move to global markets, and any marketing channel that can be followed to move the cement product globally, what are the strategic information systems used in the company and how will it contribute to supporting senior management decisions directed for this purpose? The study was conducted in the General Company for Iraqi Cement for a sample that included the company’s advanced owners, and the answers received amounted to (126) answers. The researcher used the software (SPSS V.26), in analyzing the results obtained from the research sample. And the research reached a set of conclusions, the most important of which is the weakness of the process of applying some strategic information systems within the company. The research reached a set of recommendations, the most important of which is that the Iraqi Cement Company should work on using strategic information systems. Including (GAS, NNS) systems to help other systems support the company's future decisions.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A New Species of Systole Walker (Hymenoptera, Eurytomidae)
...Show More Authors

Systole merazvensis sp. n. from Iraq, is described, figuri4 and differentiated from ,other species of the genus Systok.

View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
J. Pharm. Sci. & Res.
Synthesis of coumarin by Pechman reaction - A Review
...Show More Authors

Phenol condensed with β-keto esters via Pechmann condensation to form derivatives of Coumarin in various reaction conditions by two ways. Present paper is comparative study of synthesis Coumarin with the yield of product , reaction time and reaction conditions.

Publication Date
Wed Jan 01 2014
Journal Name
Tikrit Journal Of Social Studies And Humanities
A Cultural Window into obituaries of Iraqi Newspapers
...Show More Authors

Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Iraqi Journal Of Physics
Preparation of nano-microfibers with a different polymers
...Show More Authors

Abstract: In this research, nanofibers have been prepared by using an electrospinning method. Three types of polymer (PVA, VC, PMMA) have been used with different concentration. The applied voltage and the gap length were changed. It was observed that VC is the best polymer than the other types of polymers.

Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Cost of human resources from a behavioral perspective
...Show More Authors

Purpose/objective:

1 - To explain the financial impact of the activities and areas of human resources management and the adoption of the methodology for estimating costs on the basis of conduct and statement of how to assess costs and benefits of human resource activities.

2 - Measuring  human capital, and its impact on the financial statements.

 

Design/methodology/approach:

 Concentrated dimensions of the research paper's lack of financial statements prepared by the organizations for information mandated human resource its components of the three (attraction - development

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
Analysis of a harvested discrete-time biological models
...Show More Authors

This work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.

Scopus (6)
Scopus
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Biotechnology Research Center
Candida and Candidiasis - A review of Virulence Factors
...Show More Authors

   The occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Wed May 31 2023
Journal Name
Iraqi Geological Journal
A Survey of Infill Well Location Optimization Techniques
...Show More Authors

The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref