<span lang="EN-GB">This paper highlights the barriers that have led to a delay in the implementation of E-Health services in Iraq. A new framework is proposed to improve the E-Health sector using a SECI model which describes how explicit and tacit knowledge is generated, transferred, and recreated in organizations through main stages (socialization, externalization, combination and internalization). Class association rules (CARs) is integrated to mine the SECI model by extracting related rules which correspond to the medical advice. The proposed framework (SECICAR) can be done through a web portal to assemble healthcare professionals, patients in one environment. SECICAR will be applied to the hypertension community to show that disease if left untreated, frequently leads to serious illnesses such as heart disease. The SECICAR aims to facilitate the dissemination of tacit knowledge, which is explicit to hypertensives, in the form of strategies, guidelines and best practices. The validation of the SECICAR results displays satisfactory accuracy and reliability. Heuristic evaluation was used to test the web portal, the participants stating that there were no major issues regarding its usability.</span>
This study examined the relationship between the reporting lag (the timeliness of corporate financial reporting) and several independent variables: (1) Audit reporting lag,(2)Company Size,(3) Profitability of the company,(4)Company Age,(5) Sector Type.(6)Audit’s Opinion,(7) Market Type,(8) Gearing,(9) Concentration of ownership,(10) Audit Firm Size(11)Profit or Loss Company(12) Companies Listed lag on the PEX. In order to achieve the objectives of the study and testing its hypotheses, the data Obtained through actual data of a financial reports, and based on me
... Show MoreThe research aims to identify decent work and its impact in enhancing job immersion. The questionnaire was adopted as a tool to analyze the sample responses of (81) workers to represent an estimated response rate of (88 per cent) out of the total population of (92) individuals. The research adopted descriptive-analytical approach, and reliability calculation, arithmetic means standard deviations, relative importance, and regression analysis adopted on SPSS v.25. The conclusion shows that there is a medium correlation between decent work and job immersion, and there is a low impact of decent work with its dimensions in job immersion; extract the most important acceptable components for job from the sample point of view about the o
... Show MoreThe aim of the research to apply TD-ABC technology to determine the idle capacity of the central oil companies (oil field east of Baghdad), as a modern cost management technology based on time-oriented activities (TD-ABC) is used by industrial companies in general and oil companies on In particular to build a sustainable Calvinist pillar and make future decisions by identifying idle energy to gain it a competitive advantage, the descriptive analytical approach has been adopted in calculating and analyzing the company’s data for 2018, and the most prominent conclusions of this research are managing idle energy and the task of applying cost technology on the basis of time-oriented activities and providing Convenient spatial infor
... Show MoreThis research investigated the influence of water-absorbent polymer balls (WAPB) on reinforced concrete beams’ structural behavior experimentally. Four self-compacted reinforced concrete beams of identical geometric layouts 150 mm × 200 mm × 1,500 mm, reinforcement details, and compressive strength
Abstract
Our description of the wxperience of any poet depends on the nature the anture of his writing or his style in terms of factors affecting his experience . We have found that al- Maghout is characterized by important poetis properties that characterized all of his poetry such as the ease in compositions that are formed the vocabulary of daily life . This is what constitutes his poetic lexicon that depends on the vocabulary of space , time , and anture . Hispoetry derives its aesthetics from revealing that strains in the text for the sake of surprise and amazement with a simple realism.
this research aims at a number of objectives including Developing the tax examination process and raise its efficiency without relying on comprehensive examination method using some statistical methods in the tax examination and Discussing the most important concepts related to the statistical methods used in the tax examination and showing its importance and how they are applied. the research represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side Some statistical methods applied to the sample of the final accounts for the contracting company (limited) and the pharmaceutical industry (
... Show MoreBackground:The demand for esthetic orthodontic appliances is increasing so that the esthetic orthodontic archwires were introduced. This in vitro study was designed to evaluate the surface roughness offiber-reinforced polymer composite (FRPC) archwires compared to coated nickel-titanium (NiTi) archwires immersed in artificial saliva. Materials and Methods:Three types of esthetic orthodontic archwires were used: FRPC (Dentaurum), Teflon coated NiTi (Dentaurum) and epoxy coated NiTi (Orthotechnology). They were round (0.018 inch) in cross section and cut into pieces of 15 mm in length.Forty pieces from each type were divided into four groups; one group was left at a dry condition and the other three groups were immersed in artificial saliva (
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More