This Paper assesses the knowledge management system (KMS) requirements at Al-Ameed University concerning ISO 30401:2022. Specifically, the research aims to ascertain the degree to which international standards have been complied with and gaps that have been identified. A case study was conducted using field observations, interviews, and checklists to assess the institution's compliance with the KMS framework. The level of implementation and documentation of knowledge management processes was assessed using a seven-point scale. The findings reveal that Al-Ameed University has severe gaps in knowledge creation, sharing, and support for knowledge management in terms of strategic leadership. While certain elements like availability of resources show high degrees of compliance, others like stakeholders need assessment and continuous improvement show weaknesses. The overall degree of compliance with the ISO 30401:2022 is 58.08%, having a gap of 41.92% to be bridged. This study shows there is an urgent need to improve knowledge-sharing systems, strengthen leadership engagement, and strategically align knowledge management with the university's mission and goals. Their findings could help those academic institutions that want to improve knowledge governance and align themselves with internationally accepted standards shaking hands to become the key players in innovation and operational efficiencies. Future research should investigate KMS gap closure methodologies in other advanced situations/dimensions in higher educational settings.
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri
HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023
Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa
... Show MoreThe work in this paper focuses on the system quality of direct and coherent communication system for two computers. A system quality is represented by Signal to Noise ratio (SNR) and Bit Error Rate (BER). First part of the work includes implementation of direct optical fiber communication system and measure the system quality .The second part of the work include implementation both the( homodyne and heterodyne)coherent optical fiber communication system and measure the system quality . Laser diode 1310 nm wavelength with its drive circuit used in the transmitter circuit . A single mode of 62.11 km optical fiber is selected as transmission medium . A PIN photo detector is used in the receiver circuit. The optical D-coupler was u
... Show MoreRequire senior management of the state when developing the strategy the general budget to the clarity of the reasons that are based upon the ministries in the preparation of estimates of expenditure for the next year to justify the spending, and in the absence of targets, the ministry or government unit would not be in front, but be guided by the size of expenditure for the last year in addition to the percentage of represented an increase of appropriations required for the next year in light of the fiscal policy of the state, so the requested increase in appropriations to meet the desired increase in some of its activities and to meet the increase in salaries and prices. So must be available to the Ministry of criteria that coul
... Show MoreThe organization and coordination of any communication is based on the system of turn-taking which refers to the process by which a participant in a conversation takes the role of speaker. The progression of any conversation is achieved by the change of roles between speaker and hearer which, in its turn, represents the heart of the turn-taking system. The turn-taking system is not a random process but it is a highly organized process governed by a set of rules. Thus, this system has certain features and rules which exist in any English communicative process. These rules, if applied by speakers, help to achieve successful exchange of turns in any conversation. This paper attempts to present full exposition of the concepts of conversation
... Show MoreAbstract Since unmethylated CpG motifs are more common in DNA from bacteria than vertebrates, and the unmethylated CpG motif has recently been reported to have stimulatory effects on lymphocytes, we speculated that bacterial DNA may induce inflammation in the urinary tract. To determine the role of bacterial DNA in lower UTI, we intraurethrally injected prokaryotic DNA (extracted from E. coli) in white mice and performed histopathological study for the kidneys and urinary bladders, 24 h after the exposure. The results showed infiltration of inflammatory cells, shrinkage of glomerulus and increase the capsular space, as well as edema formation in kidney tissues. Moreover, urinary bladder sections showed infiltration of inflammatory cells.
... Show MoreHydroponics is the cultivation of plants by utilizing water without using soil which emphasizes the fulfillment of the nutritional needs of plants. This research has introduced smart hydroponic system that enables regular monitoring of every aspect to maintain the pH values, water, temperature, and soil. Nevertheless, there is a lack of knowledge that can systematically represent the current research. The proposed study suggests a systematic literature review of smart hydroponics system to overcome this limitation. This systematic literature review will assist practitioners draw on existing literature and propose new solutions based on available knowledge in the smart hydroponic system. The outcomes of this paper can assist future r
... Show MoreThe necessary optimality conditions with Lagrange multipliers are studied and derived for a new class that includes the system of Caputo–Katugampola fractional derivatives to the optimal control problems with considering the end time free. The formula for the integral by parts has been proven for the left Caputo–Katugampola fractional derivative that contributes to the finding and deriving the necessary optimality conditions. Also, three special cases are obtained, including the study of the necessary optimality conditions when both the final time and the final state are fixed. According to convexity assumptions prove that necessary optimality conditions are sufficient optimality conditions.
... Show More