This study aims to design unified electronic information system to manage students attendance in Lebanese French university/Erbil, as a system that simplifies the process of entering and counting the students absence, and generate absence reports to expel students who passed the acceptable limit of being absent, and by that we can replace the traditional way of using papers to count absence, with a complete electronically system for managing students attendance, in a way that makes the results accurate and unchangeable by the students.
In order to achieve the study's objectives, we designed an information syst
... Show More
The Islamic religion approach Rabbani urges and seeks to bring happiness to people, as Allah says: ((We sent thee not all people glad tidings and a warner, but most people do not know)) Spa: State 28
Islam looks at the concept of educational values through positive behavior derived emerging through formal and informal education. The Islamic approach works on the basis of a systematic and clear rule in the form of an integrated system includes multiple areas. As the lead actor role as the desired position.
Although
Phraseological or phraseological turn - unchanged in structure and composition, integral in meaning and lexically indivisible phrase or sentence, performing the function of a separate dictionary unit - lexemes. Idioms are found in any language of the world. But such a number of winged phrases, as in Russian, is nowhere else. Idioms play a role in displaying the national-cultural characteristics of any language. They very clearly and accurately reflect the characteristics of the perception of the world, the characteristic features of the material and spiritual life of native speakers, his mentality.
This study aimed to clarify the legal provisions concerning the senses and their role in financial transactions, in the light of the definition of all the vocabulary presented by this study (senses - the definition of senses apparent: they are hearing - sight - smell - taste - touch) in the first section. The study deals with the second topic of the reference and writing denominator phrase and includes two requirements, the first requirement: the establishment of the denominator of the phrase, which has two branches: Section I: signal Akhras. Section II: Signal of the Spokesman.
The second requirement is that writing takes the place of the phrase in financial transactions. The owners argue that the sale of the blind is correct a
Abstract
The research aims at achieving a set of objectives, which is to study a vital variable in the organizations which is the talent management and its impact on encouraging and empowering employees to take part in making appropriate decisions with their heads in the Iraqi Cement State Company. The problem of this research is in finding solutions to the weaknesses that face the managers in attracting talented employees and keep them in the company, and this leads to a weak capacity of the company on authorizing talented employees and giving them the needed confidence to participate in decision making process. The research sample was included (45) managers in the researched company. Th
... Show MoreUsing the traditional methods in teaching Islamic subject have neglected student's role and focus mainly toward teacher. Thus, the role of student in teaching process would take a negative side: following these methods cannot achieve the educational objectives of Islamic subject. Teachers who give Islamic subject do not have a full knowledge of the appropriate techniques in teaching. They lack the scientific background that qualify them for teaching. The weakness of knowledge that face Islamic teachers have arisen over different stages of education which showed their lacking in the provision of intonation and interpretation of the Quran as well as the utterance of Prophet Mohammed Hadiths. It takes time to train teachers to do a
... Show MoreThe current research aims to diagnose the extent of interest in knowledge sharing and its role in achieving organizational excellence at the level of the Iraqi environment Primary data through descriptive statistics (arithmetic mean, standard deviation, coefficient of variation, percentages, frequencies) and hypothesis testing using appropriate statistical methods for inferential statistical analysis (Pearson correlation coefficient, simple linear regression, multiple regression, path analysis) and checking the quality of the data from During (normal distribution, confirmatory factor analysis, structural modeling method, and exploratory factor analysis), after collecting data from (358) observations from the company’s leaders, as
... Show MoreThe research sought to demonstrate the effectiveness of monetary policy in banking stability by measuring the impact of monetary policy in the composite index of banking stability in Iraq for the period 2010/2017, as the stability of the financial system is one of the main objectives that the Central Bank is keen to achieve along with other objectives to ensure the performance Effective for all economic units, this is what prompted the central banks to give more attention in ensuring the safety, durability and stability of their financial systems, and the increasing interest by the Central Bank of Iraq in the subject of financial stability stems from its responsibility in ensuring a sound and stable financial system. Maintain it and mini
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More