Preferred Language
Articles
/
NxaEuocBVTCNdQwCsl_g
Managing sensitive data in cloud computing for effective information systems’ decisions
...Show More Authors

Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Irrigation And Drainage Engineering
Hydraulic and Statistical Analyses of Design Emission Uniformity of Trickle Irrigation Systems
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Requirements of High Performance Work Systems in Achieving the Entrepreneurship in University Field – Analytic Research in College of Business Administration/ University of Baghdad
...Show More Authors

 

Abstract

The resources-based introduction in the study of business organizations is increasingly dealing in the study of the human capacities and the best ways to develop them and changing the resources of the organization to be essential and competent to face the business challenges. Today’s organizations need crucial practices to face those challenges and the influences of those practices which take into consideration the importance of developing the entrepreneurship inside the organization. Those practices are called “High Performance Work Systems” which is denoted by “HPWS” and defined as the practices of human resources management which help in acquiring func

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of importance in the Intellectual Capital On Internal control Systems Analytical Research in A sample of general inspectors’ offices in Iraq
...Show More Authors

The research aims to know the influence of the intellectual capital on the internal control system in a sample of General Inspection Offices in Iraq. The research includes a sample of individuals who are working in these offices total sample (46) individuals distributed according to functional levels (General Inspector, Deputy Inspector General, and Director) , The data and information were collected by using questionnaire, which is done for this purpose, as well as personal interviews in order to reach to the results that achieve the aim of this research , Two hypotheses were formed , the first hypothesis consists of (4) secondary hypothesis , All these hypotheses were tested by using statistical tools such as (percentages, freq

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Quadratic Form Ratio Multiple Test to Estimate Linear Regression Model Parameters in Big Data with Application: Child Labor in Iraq
...Show More Authors

              The current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances.  From the diversity of Big Data variables comes many challenges that  can be interesting to the  researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The role of Techno strategy of Information management in achieving administrative innovation : A case study in the college of Management and Economics / University of Kirkuk
...Show More Authors

The present research aims to identify and define the basic dimensions of the information management strategy and the administrative creativity in the Faculty of Management and Economics / the University of Kirkuk, as well as the role played by the dimensions of the information technology management strategy in achieving the administrative innovation in the college and the research problem was formulated in several questions. The research problem was formulated in several questions centered on the correlation between the research variables, and the research was based on a major hypothesis and five sub-hypotheses emerged from which it was subjected to several tests to ensure its validity. The researcher used the descriptive-analyti

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Inventive Engineering And Science,
Increase the Capacity Amount of Data Hiding to Least Significant BIT Method
...Show More Authors

Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Temperatture esttiimattiion off EXDRA and SSUMI dwarff Nova systtems from spectroscopic data
...Show More Authors

The seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.

View Publication Preview PDF
Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Improved Method to Correlate and Predict Isothermal VLE Data of Binary Mixtures
...Show More Authors

Accurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equili

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref