Information and communication technology has a significant influence on employee procedures. Businesses are investing in e-CRM technologies, yet it is difficult to assess the performance of their e-CRM platforms. The DeLone and McLean Information Systems Success framework can be modified to the current e-CRM assessment difficulties. The new framework's different aspects provide a concise framework for organizing the e-CRM key metrics identified in this study. The purpose of this study is to apply and verify that the Updated DeLone and McLean IS Model can be employed to explain e-CRM adoption among employees, along with the extended Updated DeLone and McLean Model with its five output factors, namely system quality, service quality, information quality, ease of use employee satisfaction. For this study, data was collected from 300 employees working on e-CRM and the data were analyzed using PLS-SEM. The experimental framework has a significant effect and shows that most of the hypotheses of the study are supported. Moreover, the framework contributes to the area of the success of e-CRM and individual performance.
The formation of the identity of the ego associates with adolescence and the beginnings of youth, where represents the basic requirement for growth. This stage reflects a turning point towards the necessary autonomy for the growth of normal in adulthood that needs the ego growth from his point of view to pass eight consecutive stages of the individual faces in each particular crisis. It is determined by its growth path depending on the nature of solved positively or negatively, influenced by several factors: biological, social, cultural, personal, and a dogmatic obstacle to personal thinking which refers to the kind of sclerotic thought a bigot to the inside of obsolete beliefs refuse to discuss and consider. The final idea is debatable
... Show MoreInterval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
A loS.sless (reversible) data hiding (embedding) method inside an image (translating medium) - presented in the present work using L_SB (least significant bit). technique which enables us to translate data using an image (host image), using a secret key, to be undetectable without losing any data or without changing the size and the external scene (visible properties) of the image, the hid-ing data is then can be extracted (without losing) by reversing &n
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
1. Anti-social behavior Baghdad University students.
2. Know the differences in anti's social behavior according to gender, specialization.
3. Know-the need for love at Bagdad University students.
4. Know the relationship between anti-social behavior and the need to love.
The research sample consisted of (100) students, the researcher numbers tools to measure anti behavior and the need to love.
The results showed that college students have an anti-social behavior is weak and they need to love and there is no correlation between them Function relationship. Researcher has shown a number of recommendations and proposals.
Design of experiments (DOE) was made by Minitab software for the study of three factors used in the precipitation process of the Sodium Aluminate solution prepared from digestion of α-Al2O3 to determine the optimum conditions to a produce Boehmite which is used in production of ɤ-Al2O3 during drying and calcination processes, the factors are; the temperature of the sodium aluminate solution, concentration of HCl acid added for the precipitation and the pH of the solution at which the precipitation was ended. The design of the experiments leads to 18 experiments.
The results show that the optimum conditions for the precipitation of the sodium aluminate solution which
... Show MoreIntroduction: Dental pulp tissue contains many undifferentiated mesenchymal cells, which have the ability to differentiate into different specialized cells. Induced pluripotent stem cells have been developed by various growth factors. The present study was designed to evaluate the effect of application of a combination BMP2/TGF β1 as capped material for traumatic pulp in osteoporotic rat. Materials and Methods: Twelfth female rats (6 normal rat and other 6 osteoporotic rat)., their maxillary anterior teeth subjected to mechanical traumatized pulptomy, the left tooth has speared without treatment, while the right tooth capped with application of 0.5 μl of BMP2 and 0.5μl of TGF β1 .Evaluation of histological changes includes scoring of pu
... Show More