Preferred Language
Articles
/
SBYdWooBVTCNdQwCCZxo
Analysis of significant dimensions of e-service quality in Malaysian universities
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Minor fatwas of the star of religion special Khwarizmi (v ....... e) Matters in the Book of Rentals
...Show More Authors

Scholars have inherited a tremendous wealth in all sciences and knowledge, especially jurisprudence; therefore, the students of forensic science had to execute this precious heritage, achieving a serious scientific investigation; So I opted for the realization of this part of the Book of Leasing for the small book of fatwas of Yusuf bin Ahmed al-Khasi.

View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Using Public and Private Cloud Computing in developing the Evaluation System of annual employees' performance at Iraqi Universities: A comparative study
...Show More Authors

Abstract

Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Vitamin E Level In Friedreich’s Ataxic Phenotype Patients In Four Major Hospitals In Baghdad
...Show More Authors

Background: Friedreich ataxia (FRDA) is the most common form of inherited ataxia, comprising one-half of all hereditary ataxias with a carrier rate between 1 in 60 to 1 in 90 and with a disease prevalence of 1 per 29,000. It can occur in two forms the classic form or in association with a vitamin E dependent ataxia. The precise role of Vitamin E in the nervous system is unknown; An Oxidative attack is suspected to play a role in Ataxia with Vitamin E deficiency, as well as in Friedreich ataxia. Vitamin E is the major free-radical-trapping antioxidant.

Objective: Theobjectives of the study is to asses vitamin E level in patients with Friedreichs ataxia phenotype in Iraqi patients.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of Dental Implant Site Dimensions And Alveolar Bone Density in The Mandible Using Cone Beam Computed Tomography
...Show More Authors

Background: The quantity and the quality of available bone, influence the clinical success of dental implants surgery. Cone beam Computed tomography is an established method for acquiring bone images before performing dental implant. Cone beam computed tomography is an essential tool for treatment planning and post-surgical procedure monitoring, by providing highly accurate 3-D images of the patient's anatomy from a single, low-radiation scan which yields high resolution images with favorable accuracy. The aim of study is the Measurement of alveolar bone (height and buccolingual width) and density in the mandible among Iraqi adult subject using CBCT for assessment of dental implant site dimensions. Material and method: The study sample in

... Show More
View Publication
Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Aesthetic and Functional Dimensions of Environmental Waste in the Products of Students of the Department of Art Education: فردوس خضر الجوفي
...Show More Authors

The practice of art is an inevitable result imposed by the circumstances surrounding the human being, as he needs some knowledge associated with raw materials, tools and methods to develop skills in the formation of elements of the work of art in new ways that give a decent artistic appearance to the work of art. Through the exploratory study carried out by the researcher, which included asking the following question to the third grade students, Department of Art Education:

What types of materials are used in handicrafts and from which sources are they obtained? Through the answers, the problem of research was founded as follows:

-Are the products of students of the Department of Art Education in the handicraft material d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Use of Social Media Networks (SMNs) in Knowledge Sharing, by Using Social Cognitive Theory (SCT) A Study Conducted in Some of Iraqi Universities
...Show More Authors

   SMNs like Facebook, YouTube, Twitter, WhatsApp,..etc. are among the most popular sites on the Internet. These sites can provide a powerful means of sharing, organizing, finding information and knowledge. The popularity of these sites provides an opportunity to measure the use them in knowledge sharing, which needs a special scale, but unfortunately, there is no special scale for that. Thus, this study supposes to use SCT as a scale to measure the use of SMNs in electronic knowledge sharing due to it has been used to measure knowledge sharing with its traditional form. This study can help the decision-makers to use these SMNs to share the academics’ knowledge in educational institutes to the communi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Nov 30 2022
Journal Name
مجلة الجامعة العراقية
The competencies of lecturers and their roles in managing E-training workshops, a Pedagogical Pointview
...Show More Authors

The aim of the research is to shed light on identifying the extent of the university professor's competencies and their roles in managing and training participants in e-training workshops as a pedagogical point view. The research sample consisted of a group of (30) university professors (lecturers) in the training workshops, in scientific,humanitarian and social disciplines, including (12) a university professor (holding a trainer certificate), , the research methodology is descriptive, and the community is a group of trained participants. (115) participated in (40) e-training workshops organized by the Center for Continuing Education at the University of Baghdad (and the selection of workshops within the researcher's specialization in the

... Show More
View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Middle East and its Strategic Dimensions: a theoretical study
...Show More Authors

Characterized the Middle East has geographic, economic, and geostrategic peculiarities, but it suffers from many problems, such as disagreement over what it means as a concept, or what it represents of a geographic extension. The question is related to the ambiguity surrounding the concept of the Middle East? The purpose of its launch? As it relates to its geostrategic, economic, and geo-cultural importance? And manifestations of this importance? And to what extent he retained his value in the strategies of the major powers? Research hypotheses:

-The multiplicity of concepts for the Middle East region, with international political and Geostrategic interests.- The geostrategic value of the Middle East has made it a focal point for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
IoT E-health System for Cardiac Telemonitoring
...Show More Authors

View Publication
Scopus Crossref