This Paper assesses the knowledge management system (KMS) requirements at Al-Ameed University concerning ISO 30401:2022. Specifically, the research aims to ascertain the degree to which international standards have been complied with and gaps that have been identified. A case study was conducted using field observations, interviews, and checklists to assess the institution's compliance with the KMS framework. The level of implementation and documentation of knowledge management processes was assessed using a seven-point scale. The findings reveal that Al-Ameed University has severe gaps in knowledge creation, sharing, and support for knowledge management in terms of strategic leadership. While certain elements like availability of resources show high degrees of compliance, others like stakeholders need assessment and continuous improvement show weaknesses. The overall degree of compliance with the ISO 30401:2022 is 58.08%, having a gap of 41.92% to be bridged. This study shows there is an urgent need to improve knowledge-sharing systems, strengthen leadership engagement, and strategically align knowledge management with the university's mission and goals. Their findings could help those academic institutions that want to improve knowledge governance and align themselves with internationally accepted standards shaking hands to become the key players in innovation and operational efficiencies. Future research should investigate KMS gap closure methodologies in other advanced situations/dimensions in higher educational settings.
This work evaluates the economic feasibility of various production scenarios for the Zubair reservoir in the Kifl oil field using cash flow and net present value (NPV) calculations. The Kifl field is an exploratory field that has not yet been developed or assessed economically. The first well was drilled in 1960, and three other wells were later drilled to assess the oil accumulation, so in this research, Different production scenarios were evaluated economically. These scenarios were proposed based on the reservoir model of the Zubair formation in the field. The research methodology used QUE$TOR software to estimate capital expenditures (CapEx) and operating expenditures (OpEx) based on field-level data, production prof
... Show MoreA novel welded demountable shear connector for sustainable steel-concrete composite structures is proposed. The proposed connector consists of a grout-filled steel tube bolted to a compatible partially threaded stud, which is welded on a steel section. This connector allows for an easy deconstruction at the end of the service life of a building, promoting the reuse of both the concrete slabs and the steel sections. This paper presents the experimental evaluation of the structural behavior of the proposed connector using a horizontal pushout test arrangement. The effects of various parameters, including the tube thickness, the presence of grout infill, and the concrete slab compressive strength, were assessed. A nonlinear finite element mode
... Show MoreBackground: Polycystic ovary syndrome (PCOS) is the most common endocrine abnormality in women, there is an increasing evidence for an oxidative stress in PCOS that induce genomic and mitochondrial deoxyribonucleic acid damage that leads directly to reduced fertility. The objectives of this study are to assess and compare the periodontal health status by measuring clinical periodontal parameters (PLI, GI and BOP)as well as serum levels of superoxide dismutase at gingivitis ,gingivitis with PCOS and healthy periodontium groups, then correlate between clinical and biochemical parameters. Materials and Methods: 60 females with an age range between (25-40) years old had been tested and divided into3 groups ,the control group consists of (20) f
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis study is to evaluate plasma levels of several cytokines in preeclamptic pregnancies compared to those of healthy pregnancies. Ninety pregnant women with preeclampsia (37 mild & 53 severe) and thirty healthy pregnant women were enrolled in the study. Blood samples were taken and plasma levels of IL-8, IL-10, and IFN-? were measured by enzyme-linked immunosorbent assay (ELISA). Preeclamptic women and their severe cases but not mild cases had significantly (P<0.05) increased levels of plasma IL-8, and IFN-? as compared with healthy pregnancies. By contrast, plasma levels of IL-10 was significantly (P<0.05) increased in healthy pregnant women as compared to all groups of preeclampsia. Preeclampsia is associated with an imbalance betwe
... Show MoreIn recent years , the interest in gold (III) species have gained more and more attention for cancer chemotherapy , this was stimulating by the possibility to develop new agents with mode of action and clinical profile different from the established platinum metalodrugs.
With this frame, recently new square planar Au(III) complexes (Au(L)(L')n); where L=SCH2COO- ; L'=HSCH2COO- had been synthesized with S/O – donor ligands.
In this article and by the aim to replace, one of (L') ligand by anion chloride ligand (which supposedly more relevant for the biodistribution of the compound than for its pharmacodynamic effects), new complex (Au(L')