Preferred Language
Articles
/
WRhK9pUBVTCNdQwC34CG
Evaluation of Knowledge Management System Requirements According to ISO 30401
...Show More Authors

This Paper assesses the knowledge management system (KMS) requirements at Al-Ameed University concerning ISO 30401:2022. Specifically, the research aims to ascertain the degree to which international standards have been complied with and gaps that have been identified. A case study was conducted using field observations, interviews, and checklists to assess the institution's compliance with the KMS framework. The level of implementation and documentation of knowledge management processes was assessed using a seven-point scale. The findings reveal that Al-Ameed University has severe gaps in knowledge creation, sharing, and support for knowledge management in terms of strategic leadership. While certain elements like availability of resources show high degrees of compliance, others like stakeholders need assessment and continuous improvement show weaknesses. The overall degree of compliance with the ISO 30401:2022 is 58.08%, having a gap of 41.92% to be bridged. This study shows there is an urgent need to improve knowledge-sharing systems, strengthen leadership engagement, and strategically align knowledge management with the university's mission and goals. Their findings could help those academic institutions that want to improve knowledge governance and align themselves with internationally accepted standards shaking hands to become the key players in innovation and operational efficiencies. Future research should investigate KMS gap closure methodologies in other advanced situations/dimensions in higher educational settings.

Crossref
View Publication
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Organizational Performance Evaluation Maysan Water Directorate - Case Study
...Show More Authors

The research aims to improve the performance of the Directorate of Maysan water by reconciling the objectives of the employees of the directorate with the objectives of the Directorate itself, as well as to identify the strengths and weaknesses in the performance of the Directorate (Leadership - Individuals - Knowledge - Operations - Financial) and presented to experts and arbitrators of specialized, and the researchers have relied on the case study methodology as a descriptive approach is comprehensive analysis, and draws on more than one approach, method and scientific design, has been interviewed a number of experts in the Directorate Maysan's water Identify the weaknesses and strengths of the Directorate, the research has rea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design an Integral Sliding Mode Controller for a Nonlinear System
...Show More Authors

The goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Drug Delivery Technology
Transethosomes a novel transdermal drug delivery system for antifungal drugs
...Show More Authors

Scopus (9)
Scopus
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Pose Invariant Palm Vein Identification System using Convolutional Neural Network
...Show More Authors

Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Private Backend Server Software-Based Telehealthcare Tracking and Monitoring System
...Show More Authors

In these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso

... Show More
View Publication
Scopus (27)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Remote Patient Healthcare surveillance system based real-time vital signs
...Show More Authors

Today many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of  ECG signal such as Q,R,S, and T waves.  The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati

... Show More
View Publication Preview PDF
Crossref (6)
Crossref