The subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to
... Show MoreIn light of the increasing importance of interim financial statements they provided these lists of information that enables users of accounting information to make wise investment decisions and predict the company's activities in light of changes the updated rather than wait until the end of the year and accessing information provided by the annual financial statements. In light of this research has come to the most important set of conclusions the adoption of interim financial information has been audited by the external auditor to the availability of basic qualitative characteristics in the accounting information contained in the (appropriate and timely manner, reliability and comparability) and this in turn leads to the impact on reli
... Show MoreThe present research aims to know :
The level of Cognitive failures, information processing styles, and the problem-solving among the university students ,so it is aims to know the contribution of cognitive failures on the information processing styles and problem-solving, the research sample was (400) males and females student from the University of Wasit chosen randomly from both gender and for the study of the morning and evening .So these scales had been used as a research tool (failures cognitive scale ,the scale of information processing styles , and the scale of problem solving) , and by using the statistical m
... Show Morethe research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.
To achieve this goal, the researcher has built a list of criteria according to the following steps:
First - identify the key areas covered by the whole list which are:
1 – Standards of system building and implementing with the operating screens.
2 – Standards of display forms including audio and video presentation.
3 – Standards which are related to the program philosophy.
4 - Standards which are related to the program objectives.
... Show More
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreIn its theoretical framework, this study dealt with the subjects of high commitment management and organizational excellence, as the study came in response to the growing developments and changes in the fields of management. It includes an analysis of correlation and effect between high commitment management, which has been attracting a lot of attention recently due to the intensifying rivalry between organizations because of certain external factors like globalization and world markets liberation, and its effect in achieving organizational excellence.
The practical framework, on the other hand, dealt with the analysis of correlation and effect between the study's variables. The problem
... Show MoreAntibiotic resistance is the capability of the strains to resist or protect themselves from the effects of an antibiotic. Such a resistance towards the current antimicrobials leads to the search of novel antimicrobials. Nanotechnology has been promising in different field of science and among it is the use of nanoparticles as antibacterial agents. The gastrointestinal tract seems to be the primary reservoir of uropathogenic E.coli (UPEC) in humans. UPEC strains harbour the urinary tract and cause urinary tract infection. They cause serious ailments in terms of humans. They develop resistance and increase their virulence by forming biofilms. They also show a remarkable locomotory movement with the aid of autoinducer controlled ge
... Show MoreInternal control is system,defined and implemented under its responsibility , which aims to ensure that; laws and regulations are complied with; the instructions and directional guidelines fixed by Executive Management or the Management Borad are applied; the company internal processes are functioning correctlly , particularly those implicating the security of its assets; Financial Information is reliable; and generally contributes to the control over its activities , to the efficiency of its operation and to the efficient utilisation of its Resources. By helping to anticipate and control the risks involved in not meeting the objectives the company has set for itself, the internal control system plays akey role in conducting & monito
... Show More