Preferred Language
Articles
/
jcois-461
Electonic management   And its role in the development of the Zakat Foundation
...Show More Authors

The world is witnessing a remarkable development in the use of technology, which has made it an essential means of investment, especially in the field of management, which provided many of the facilities experienced by the institutions, including improving revenues, shortening time and saving labor. Islamic investment technology as a successful means of management and we touched on the Zakat Foundation as an application model.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Global virtual teams management system: project manager guide
...Show More Authors

Global virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Bulletin Of Electrical Engineering And Informatics
Traffic management inside software-defined data centre networking
...Show More Authors

In recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur

... Show More
View Publication
Scopus (16)
Crossref (13)
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Jul 26 2025
Journal Name
Al–bahith Al–a'alami
Verses of Monks in the Holy Quran Study and Analysis
...Show More Authors

Tafsir, ‘interpretation’ is one of the most important sciences the Muslims need. Because Allah, Almighty, revealed the Qur’an to be a way of life for the Muslims in which the healing of what is in the chest, including their goodness and their peasant. Allah says:
“O people, an admonition has indeed come to you from your Lord and a healing for what is in the hearts; and a guidance and a mercy for the believers.”
In order to achieve the goal for which God revealed the Quran must be understood and managed verses:” This is a Book that We have revealed to you abounding in good, that they may ponder over its verses, and that those who have understanding may be mindful.”
The Prophet (PBUH) and his companions understood t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Aesthetic and expressive characteristics in the works of Jean Dubuffet
...Show More Authors

The research presented the tagged (aesthetic and expressive characteristics in the works of Jean Dubuffet), so the research objective was: to know the aesthetic and expressive characteristics in the works of (Jean Dubuffet), and the research included four chapters. The aim of the research, the limits of the research, and the definition of terms. The second chapter included four topics. The first topic presented the aesthetic essence and style, while the second topic dealt with expressionism: approaches in concept and meaning.
While the third topic was preoccupied with presenting the aesthetic and expressiveness in the drawings of modernity and beyond, while the fourth topic dealt with: Jean Dubuffet and the experience of raw art. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
The sale of adultery wisdom and pictures      In Islamic law
...Show More Authors

The research came in order to take note of the types of inscription and to clarify its provisions and to show some of the possibilities of Islamic law in the sales side and its ability to influence in Islamic markets, and to achieve the required level and appropriate of the transactional results by activating them in economic life, and give a clear picture of the performance of selling in the law and the possibility of applying one of Its uses in this aspect, and enable them to take advantage of the method of explicitly sell without the injustice of others as one of those useful sales uses.

View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Development of East Baghdad Oil Field By Clusters of Horizontal Wells
...Show More Authors

There are varieties of reasons lead for drilling horizontal wells rather than verticals. Increasing the recovery of oil, especially from thin or tight reservoir permeability is the most important parameter. East Baghdad oil field considered as a giant field with approximately more than 1billion barrel of a proved reserves accompanying recently to low production rate problems in many of the existing wells.    It is important to say that presence of of  horizontal wells in East Baghdad field especially by converting some of already drilled wells by re-entry drilling horizontal sections may provide one of best solutions for the primary development stage in East Baghdad field which may be followed by drilling new horizont

... Show More
Crossref (2)
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Development of East Baghdad Oil Field By Clusters of Horizontal Wells
...Show More Authors

There are varieties of reasons lead for drilling horizontal wells rather than verticals. Increasing the recovery of oil, especially from thin or tight reservoir permeability is the most important parameter.

East Baghdad oil field considered as a giant field with approximately more than 1billion barrel of a proved reserves accompanying recently to low production rate problems in many of the existing wells.

   It is important to say that presence of of  horizontal wells in East Baghdad field especially by converting some of already drilled wells by re-entry drilling horizontal sections may provide one of best solutions for the primary development stage in East Baghdad field which may be followed by drilling n

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th

... Show More
View Publication Preview PDF
Crossref