Preferred Language
Articles
/
JBZm4osBVTCNdQwC7uPs
A Proposed Approach to Agricultural Extension in Iraq for a Better Response to the Needs of farmer’s to Address Their Challenges
...Show More Authors

View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Development means in Iraqi commercial banks to reduce unemployment: A sample of private commercial banks in Iraq
...Show More Authors

Many economists believe that the development and promotion of small and medium-sized enterprises is one of the most important sources of economic and social development in countries in general and in developing countries in particular. This is considered to be an essential starting point for increasing production capacity and contributing to tackling poverty and unemployment. In view of the importance of these projects, most developing countries have concentrated their efforts on them. They have encouraged the establishment of small and medium industries, especially after they have proved their ability and efficiency in dealing with the major problems facing different economies.

The banking system plays an important role by finan

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Apr 08 2023
Journal Name
Iraqi Journal Of Oil And Gas Research (ijogr)
How to Estimate the Major Petrophysical Properties: A Review
...Show More Authors

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 15 2017
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
A Prototype and Roadmap for Transition to IPv6 with Performance Evaluation
...Show More Authors

The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Science
A Comparative Study for Supervised Learning Algorithms to Analyze Sentiment Tweets
...Show More Authors

      Twitter popularity has increasingly grown in the last few years, influencing life’s social, political, and business aspects. People would leave their tweets on social media about an event, and simultaneously inquire to see other people's experiences and whether they had a positive/negative opinion about that event. Sentiment Analysis can be used to obtain this categorization. Product reviews, events, and other topics from all users that comprise unstructured text comments are gathered and categorized as good, harmful, or neutral using sentiment analysis. Such issues are called polarity classifications. This study aims to use Twitter data about OK cuisine reviews obtained from the Amazon website and compare the effectiveness

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Compared to the poverty indicators in Iraq in 2007
...Show More Authors

 

     There is poverty because of the difference in capacity and material resources, Previously poverty known on the basis of disparity between income and inadequate income. It realize later that fare wore effects of poverty is the erosion of human capital. The human poverty is the loss of food, education, health care and shelter.

     In order to provide a database that target the poor  , it have been propped a document on the features of poverty and the whereabouts of the poor and the rate of disparity between provinces.

    Here the goal of the research is the identify the factors affecti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
البحوث التربويةوالنفسية
Preparing a teacher’s guide for computer books for the intermediate stage according to learning styles
...Show More Authors

Preview PDF
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Alternative Approach to Extract the Bulk Etching Rate of PADC Nuclear Detector
...Show More Authors

     The paper aims to propose the maximum track length (Lmax) measurement as an alternative approach to evaluate and extract the bulk etch rate (Vb) of the nuclear detector PADC CR-39, and compare it with the results obtained by the removal layer thickness measurement of the etched detector. The alternative Lmax-method mainly relies on the measuring the length of the etched tracks, their maximum values and saturation times from the obtained track profile images. The detectors were irradiated with different energies of alpha particles emitted from the 241Am source and then etched in a 6.5 N NaOH solution at 70±1oC for different successive time intervals. In

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The extent of the industrial company's response to blue market strategy indicators: Applied research
...Show More Authors

The current research aims to describe the level of responsiveness and awareness of the officials of the General Company for Construction Industries to the indicators of the blue market strategy of (1. reduction 2. exclusion 3. increase 4. innovation) and the degree of prioritization according to their importance as well as the differences in the responses of the sample investigated according to the personal variables. As a main tool in the collection of data from the sample, which consisted of(34) officers (Associate, Manager, Section Manager, Division Officer) in the company being investigated, and computed mean, standard deviations, percentage weights,and test (x2 )  based on the SPSS. The research reached the following

... Show More
View Publication
Crossref