Preferred Language
Articles
/
PBfYkI8BVTCNdQwCSHso
Application of the updated DeLone and McLean IS success method to investigate e-CRM effectiveness
...Show More Authors

Information and communication technology has a significant influence on employee procedures. Businesses are investing in e-CRM technologies, yet it is difficult to assess the performance of their e-CRM platforms. The DeLone and McLean Information Systems Success framework can be modified to the current e-CRM assessment difficulties. The new framework's different aspects provide a concise framework for organizing the e-CRM key metrics identified in this study. The purpose of this study is to apply and verify that the Updated DeLone and McLean IS Model can be employed to explain e-CRM adoption among employees, along with the extended Updated DeLone and McLean Model with its five output factors, namely system quality, service quality, information quality, ease of use employee satisfaction. For this study, data was collected from 300 employees working on e-CRM and the data were analyzed using PLS-SEM. The experimental framework has a significant effect and shows that most of the hypotheses of the study are supported. Moreover, the framework contributes to the area of the success of e-CRM and individual performance.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Dogmatism and Its Relation to the Formation of Ideological Identity of the University Students
...Show More Authors

The formation of the identity of the ego associates with adolescence and the beginnings of youth, where represents the basic requirement for growth. This stage reflects a turning point towards the necessary autonomy for the growth of normal in adulthood that needs the ego growth from his point of view to pass eight consecutive stages of the individual faces in each particular crisis. It is determined by its growth path depending on the nature of solved positively or negatively, influenced by several factors: biological, social, cultural, personal, and a dogmatic obstacle to personal thinking which refers to the kind of sclerotic thought a bigot to the inside of obsolete beliefs refuse to discuss and consider. The final idea is debatable

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lossless Data Hiding Using L·SB Method
...Show More Authors

A loS.sless (reversible) data hiding (embedding) method  inside  an image  (translating medium)  - presented   in  the  present  work  using  L_SB (least  significant  bit). technique  which  enables  us to translate   data  using an  image  (host  image),  using  a  secret  key, to  be  undetectable  without losing  any  data  or  without   changing   the  size  and  the  external   scene (visible  properties) of the image, the hid-ing data is then can  be extracted (without  losing)   by reversing &n

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Anti-Social behavior and its relationship to the need to love at Baghdad University students
...Show More Authors

1. Anti-social behavior Baghdad University students.
2. Know the differences in anti's social behavior according to gender, specialization.
3. Know-the need for love at Bagdad University students.
4. Know the relationship between anti-social behavior and the need to love.
The research sample consisted of (100) students, the researcher numbers tools to measure anti behavior and the need to love.
The results showed that college students have an anti-social behavior is weak and they need to love and there is no correlation between them Function relationship. Researcher has shown a number of recommendations and proposals.

View Publication Preview PDF
Publication Date
Thu Jun 30 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Determination of the Optimum Conditions for the Production of Gamma Alumina (ɤ-Al2O3) By the Precipitation Method of the Sodium Aluminate Solution
...Show More Authors

Design of experiments (DOE) was made by Minitab software for the study of three factors used in the precipitation process of the Sodium Aluminate solution prepared from digestion of α-Al2O3  to determine the optimum conditions to a produce Boehmite which is used in production of ɤ-Al2O3 during drying and calcination processes, the factors are; the temperature of the sodium aluminate solution, concentration of HCl acid added for the precipitation and the pH of the solution at which the precipitation was ended. The design of the experiments leads to 18 experiments.

   The results show that the optimum conditions for the precipitation of the sodium aluminate solution which

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 22 2020
Journal Name
Systematic Reviews In Pharmacy
Effect of Application of BMP2/TGF β1 in Traumatic Pulp of Osteoporotic Rat
...Show More Authors

Introduction: Dental pulp tissue contains many undifferentiated mesenchymal cells, which have the ability to differentiate into different specialized cells. Induced pluripotent stem cells have been developed by various growth factors. The present study was designed to evaluate the effect of application of a combination BMP2/TGF β1 as capped material for traumatic pulp in osteoporotic rat. Materials and Methods: Twelfth female rats (6 normal rat and other 6 osteoporotic rat)., their maxillary anterior teeth subjected to mechanical traumatized pulptomy, the left tooth has speared without treatment, while the right tooth capped with application of 0.5 μl of BMP2 and 0.5μl of TGF β1 .Evaluation of histological changes includes scoring of pu

... Show More
View Publication Preview PDF