Preferred Language
Articles
/
abaa-511
FACTORS AFFECTING WOMEN’S USE OF ELECTRONIC MARKETING ON SOCIAL MEDIA : (Field Study)
...Show More Authors

The research aims to determine the factors affecting the woman’s use of electronic marketing in social networking sites, and to know the extent of the sample’s use of social networking sites for electronic shopping purposes. The research tool used the questionnaire form that was designed in its final form after presenting it to the arbitrators and it included a set of questions and a five-Likert scale, and used the spss statistical program to perform the statistical operations that were laid out in tables showing the frequencies, percentages and percentages Salary, mean, standard deviation, and correlation using the Spearman correlation coefficient, the Ka2 square test, the F test, the Alpha Cronbach test, and arrived at Searching to a set of results, the most important of which is the existence of a large extent of electronic marketing from the internet sites, and that Facebook is one of the most used social networking sites in marketing, and the hypothesis test showed a significant correlation between marketing sites and the extent to which the sites meet the needs of women, and the results also showed that there are differences between the sample in Demographic data towards the use of women for e-marketing via social media, and there is also an indication of the degree of consistency in the sample averages towards the factors affecting the woman's use of e-marketing.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 31 2022
Journal Name
Journal Of The College Of Education For Women
The Reality of Evaluating Teacher Performance in the Sultanate of Oman in Light of Global Models
...Show More Authors

The aim of the research is to reveal the reality of teacher performance evaluation in the Sultanate of Oman in light of some global models. The study followed a qualitative descriptive research design. Seven forms of teacher formative and summative assessments were analyzed. Besides, an analytical template was developed, consisting of six areas related to the teaching performance of teachers. These included: lesson planning and preparation, learning environment, education, professional development, student academic, and community and parental partnership. The study reached a number of results; the most notable is the lack of change of forms for more than a decade despite the rapid development of the educational system in the sultanate in

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of the law of amending the unified pension law No. (26) of 2019 on the size of tax revenues An applied research on a sample of Iraqi public universities: أثر تطبيق قانون التقاعد الموحد رقم (26) لسنة 2019 على حجم الايرادات الضريبية
...Show More Authors

The contribution rate of tax revenues in the federal budget is very small compared to the rate of contribution of oil revenues and this leads to negative repercussions on the Iraqi economy and the budget becomes a prisoner of high and low oil prices, and this is a problem that needs to be studied to know the extent of the impact of economic and political decisions on the size of tax revenue and The research goal is determined in studying the effect of amending the Unified Law No (26) of 2019 on the size of annual tax revenues .                                   &

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
2016 6th International Conference On Information Communication And Management (icicm)
Enhancing case-based reasoning retrieval using classification based on associations
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
...Show More Authors
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Nativa,
Benthic invertebrate at three sites on the Tigris River, Iraq
...Show More Authors

The study was conducted from November 2021 to May 2022 at the three study sites within the Baghdad governorate. The study aims to identify the impact of human activities on the Tigris River, so an area free of human activities was chosen and represented the first site. A total of 48 types were diagnosed, 6204 ind/m3 spread over three sites. The following environmental indicators were evaluated: Constancy Index (S), Relative abundance index (Ra), Richness Index (between 17.995 and 23.251), Shannon Weiner Index (0.48-1.25 bit/ind.), Uniformity Index (0.124 -0.323). The study showed that the highest percentage recorded was for the phylum Annileda 34%; and the stability index shows that taxes (Stylaria sp., Aoelosoma sp., Branchinra sowerby, Ch

... Show More
Scopus
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref