Preferred Language
Articles
/
_hYXh4sBVTCNdQwCy8zL
The virtual teams: E-leaders challenges

Scopus Crossref
View Publication
Publication Date
Fri Nov 01 2013
Journal Name
2013 International Conference On Research And Innovation In Information Systems (icriis)
Scopus (10)
Crossref (3)
Scopus Crossref
View Publication
Publication Date
Sun Jun 01 2014
Journal Name
2014 International Conference On Computer And Information Sciences (iccoins)
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
E-commerce Application Based on Visual Cryptography and Chen’s Hyperchaotic

   This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Proposal Hybrid CBC Encryption System to Protect E-mail Messages

Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher B

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 05 2011
Journal Name
Global Journal Of Health Science
Analysis of Acute Viral Hepatitis (A and E) in Iraq

Hepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative

... Show More
Crossref (14)
Crossref
View Publication
Publication Date
Wed Nov 20 2024
Journal Name
Jornal Of Al-muthanna For Agricultural Sciences
View Publication
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE ROLE OF SPECIFIC AMINO ACIDS IN THE PROTECTION OF E. COLI AGAINST B-LACTAM ANTIBIOTICS IN VITRO

The role of specific amino acids namely cysteine, methionine, threonine and asparagine in the protection provided by vamin solution against B-lactam inhibition to E. coli was evaluated in vitro In minimal medium, cells were treated with 32 ug/ml of penicillin G, carbenciLlin, hostacillin, cloxacillin and cephalotin in the presence of specific amino acid supplementation. Deletion of specific amino acids from the media abolished the protection provided by vamin. Threonine was essential for the protection of cells against all tested antibiotics, while cysteine was essential for protection against carbencillin and sephalotin. Deletion of methionine or asparagine abolished the protection against carbencillin and to a less extent cephalotin.

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 27 2018
Journal Name
Journal Of The College Of Education For Women
Some urban structures of the city of Baghdad in the book almntadham Ibn al-Jawzi (d. 597 e)

 We conclude that this study has dealt with an important aspect of the book that was not clearly defined in the book as it was derived through the book's translations, namely, the extraction of those urban structures of the city of Baghdad, which were of great importance in the religious, cultural, economic and social life at that time, The important link that reflected the development of the Islamic city in general and Baghdad in particular, as he addressed such urban facilities through the translations of the book that did not offer the outline or information about those facilities, but only the name only, and here lies the difficulty in addressing Such as T. As subjects because they need the most accurate analysis of facilities t

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 09 2021
Journal Name
Review Of International Geographical Education
E-Learning Applications According To The Levels Of STEM Literacy For Teachers Of Physics At The Secondary Stage

E-learning applications according to the levels of enlightenment (STEM Literacy) for physics teachers in the secondary stage. The sample consists of (400) teachers, at a rate of (200) males (50%), and (200)females (50%), distributed over (6) directorates of education in Baghdad governorate on both sides of Rusafa and Karkh. To verify the research goals, the researcher built a scale of e-learning applications according to the levels of STEM Literacy, which consists of (50) items distributed over (5) levels. The face validity of the scale and its stability were verified by extracting the stability coefficient through the internal consistency method “Alf-Cronbach”. The following statistical means were used: Pearson correlation coefficient,

... Show More
Publication Date
Tue Dec 06 2011
Journal Name
Journal Of Planner And Development
Human Resources Investment as an Introduction to improve the efficiency & activity of workers in E – Government

The human resources are considered to be the main pillar of the organizations , economic development and the foundation of moving wheels of individual growth. This is considered as the basic tasks for any productive and economic activity . The investment of the human resources is the economic pillar of production , but the most important element of the production . This research tried to access the method of resource investment and to identify the problems and training as key element in establishment of E –government . A questionnaire document have been distributed to the workers at different levels in the colleges and institutes. The research concluded the necessity of job description , continuous training of the workers , usi

... Show More
View Publication Preview PDF