Preferred Language
Articles
/
OhfVkI8BVTCNdQwCmnsi
Organizational and behavioral attributes’ roles in adopting cloud services: An empirical study in the healthcare industry
...Show More Authors

The need for cloud services has been raised globally to provide a platform for healthcare providers to efficiently manage their citizens’ health records and thus provide treatment remotely. In Iraq, the healthcare records of public hospitals are increasing progressively with poor digital management. While recent works indicate cloud computing as a platform for all sectors globally, a lack of empirical evidence demands a comprehensive investigation to identify the significant factors that influence the utilization of cloud health computing. Here we provide a cost-effective, modular, and computationally efficient model of utilizing cloud computing based on the organization theory and the theory of reasoned action perspectives. A total of 105 key informant data were further analyzed. The partial least square structural equation modeling was used for data analysis to explore the effect of organizational structure variables on healthcare information technicians’ behaviors to utilize cloud services. Empirical results revealed that Internet networks, software modularity, hardware modularity, and training availability significantly influence information technicians’ behavioral control and confirmation. Furthermore, these factors positively impacted their utilization of cloud systems, while behavioral control had no significant effect. The importance-performance map analysis further confirms that these factors exhibit high importance in shaping user utilization. Our findings can provide a comprehensive and unified guide to policymakers in the healthcare industry by focusing on the significant factors in organizational and behavioral contexts to engage health information technicians in the development and implementation phases.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Oct 01 2014
Journal Name
Engineering And Technology Journal
Investigating Forward kinematic Analysis of a 5-axes Robotic Manipulator using Denavit-Hartenberg Method and Artificial Neural Network
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Al-khwarizmi Engineering Journal
Extraction of Bovine Serum Albumin by Aqueous Two-Phase System Using PEG4000/Sodium Citrate and PEG8000/Sodium Phosphate
...Show More Authors

Aqueous Two Phase System (ATPS) or liquid-liquid extraction is used in biotechnology to recover valuable compounds from raw sources. In Aqueous Two-Phase Systems, many factors influence the Partition coefficient, K, (which is the ratio of protein concentration in the top phase to that in the bottom phase) and the Recovery percentage (Rec%). In this research, two systems of ATPS were used: first, polyethylene glycol (PEG) 4000/Sodium citrate (SC), and the second, PEG8000/ Sodium phosphate (SPH), for the extraction of Bovine Serum Albumin (BSA). The behavior of Rec% and K of pure (BSA) in ATPS has been investigated throughout the study by the effects of five parameters: temperature, concentration of polyethylene glycol (P

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 03 2015
Journal Name
Baghdad
Synthesis, characterization and Antibacterial of 2, 3 Dihydrobenzo Thiazole -2- Carboxylic acid complexes with some selected Metal ions.
...Show More Authors

Publication Date
Sat Mar 04 2023
Journal Name
Baghdad Science Journal
Nordhaus-Gaddum Type Relations on Open Support Independence Number of Some Path Related Graphs Under Addition and Multiplication
...Show More Authors

In this paper, Nordhaus-Gaddum type relations on open support independence number of some derived graphs of path related graphs under addition and multiplication are studied.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Feb 20 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of different acids surface treatments and thermocycling on shear bond strength of composite resin to feldspathic ceramic
...Show More Authors

Background: the aim of this study was to evaluate the effect of different surface acids treatments (37%phospjoric acid, 5%hydrofluoric acid, 1.23 acidulated phosphate fluoride) of feldspathic ceramic VITA 3D MASTER , and the effect of thermocycling on shear bond strength using a ceramic repair kit (ivoclar/vivadent). Material and Methods: sixty Nickel-Chromium metal base plates were prepared(9mm diameter,3mm depth) using lost wax technique, 2mm thick layer of ceramic(VITA 3D MASTER) fused to metal plates, all specimens were embedded in acrylic resin blocks except their examined surfaces and divided into 3 main groups 20 specimens each, Grp A: treatment with 37%phosphoric acid for 2 mins, Grp B: etching with 5% hydrofluoric acid for 2mins,

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Appearance and Decay of Split-brain Theory to Explain Human Artistic Activity: A Historical Review: بدر محمد المعمري
...Show More Authors

Nearly, in the middle of 1970s the split-brain theory became the only theory that explains human creativity used in all fine art and art education schools. In fact, this theory- which appeared for first time in the middle of 1940s – faced many radical changes including its concepts and structures, and these changes affected both teaching art and art criticism. To update people awareness within art field of study, this paper reviews the split-brain theory and its relationship with teaching art from its appearance to its decay in 2013 and after.

View Publication Preview PDF
Crossref
Publication Date
Thu Oct 08 2015
Journal Name
Journal Of Kerbala University
Synthesis, Spectroscopic and Biological Studies of some metal ions complexes with 1-Phenyl-3-pyridin-2-ylmethyl-thiourea
...Show More Authors

حضر الليكاند (L) 1-فنيل-3-بردين-2-يل مثيل-ثايويوريا من تفاعل 2-أمينو مثيل بردين مع فنيل ايزوثايوسيانيت وبنسبة 1: 1 وشخص الليكاند بواسطة التحليل الدقيق للعناصر (C, H, N), الأشعة تحت الحمراء، الأشعة فوق البنفسجية–المرئية وطيف الرنين النووي المغناطيسي كما حضرت وشخصت معقدات أملاح بعض ايونات العناصر الثنائية التكافؤ (Co, Ni, Cu, Cd and Hg). استخدمت تقنية الأشعة تحت الحمراء، الأشعه فوق البنفسجية-المرئية, التوصيلية الكهربائية و الا

... Show More
Publication Date
Sat Nov 05 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Image Compression Based on Cubic Bezier Interpolation, Wavelet Transform, Polynomial Approximation, Quadtree Coding and High Order Shift Encoding
...Show More Authors

In this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Wed Nov 15 2023
Journal Name
Oncology And Radiotherapy
Synthesis, spectroscopic characterization, molecular docking, antioxidant and anticancer studies of some metal complexes from tetraazamacrocyclic Schiff base ligand
...Show More Authors

Five novel nickel, iron, cobalt, copper, and mercury complexes were synthesized from tetraazamacrocyclic Schiff base ligand (L), which were derived from 3-(4-(dimethyl amino) benzylidene) pentane-2,4-dione and 1,2- diaminocyclohexane in a 2:2 molar ratio. Many physico-chemical and spectroscopic techniques, including melting point, 1HNMR, 13CNMR, elemental analysis, molar conductance, magnetic susceptibility, UV-Vis, FT-IR, and thermogravimetric analysis (TGA), were used to characterize the Schiff base ligand and all metal complexes. The octahedral geometry of all the complexes [MLCl2] is confirmed by spectroscopic analyses. All substances' biological properties, such as their in vitro antioxidant activity or level of free radical scavenging

... Show More