Preferred Language
Articles
/
jeasiq-1515
تقنيات شبكة المعلومات ودورها في إنجاز عمليات الشراء الالكتروني والتسويق الالكتروني* دراسة حالة في شركة بغداد للمشروبات الغازية- المساهمة المختلطة
...Show More Authors

Information Technology has become one of the Most Prominent tools in the Era of Technology and Telecommunication of our Digital World. For that Reasons most Organizations had taken the tools Adapted to their Present and Future Directions and for the Improvement for it's Operations and Workability in Internal or External Enviroment. Consequently the Points of Strength Beats the Weakness and as Result of Increase Opportunities and Decrease the Threats Facing these Organizations. This Search has been made to test the Existence or not Existence role of the Information Network Technologies that Include {Internet and Extranet} in Application of Information Technology that Include {Electronic Purchasing and Electronic Marketing}. We Depended Upon Case Study and Check List; we got from then the Data and the Needed Information to be analyzed to reach the result of this Search. This Search Reached a Very Important Conclusion that Include the Existence of role of Information Network Technologies in Application of Information Technology. This Search Recommend that the Company must Special Attention to Internal Network (Intranet) as well as given a Great Role to Information Technology Application Represented in (Electronic Purchasing and Electronic Marketing).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Achieve the internal and external dimensions of corporate social responsibility through the human resources management strategies / case study in the Municipality of Ramadi.
...Show More Authors

The main focus of research is on how to achieve the internal and external dimensions of corporate social responsibility through human resources management strategies, which is a major of research aimed. The main problem of this research was confirmed, which confirms that there is an unclear role for social responsibility, lack of human resources management strategies, and ambiguity of roles in the municipality under study. The diagnose of the problem and determining the gap between the internal and external dimensions of social responsibility and human resources management was identified, which attacked the researcher's attention to navigate in this subject, look for the reasons for the gaps and try to reduce them. The case study

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The role of organizational change in easing the organizational conflict: an exploratory study of the opinions of a sample of managers and workers in Iraq to EarthLink Network Services Company And communications
...Show More Authors

Research on the role of organizational change in easing the organizational conflict focuses for being one of the important topics and relatively modern and which have a significant impact on the future of organizations, so this study was to identify the relationship and the impact of organizational change and of deportation (technological, organizational structure, human resources, the change in the task) at the organizational conflict in the Earth company link Iraq, in order to reach the goals of the research, it has been the development of a questionnaire distributed to a random sample of (100) composed employees from managers and heads of departments and the people and staff at the Earth company link Iraq, the study found: the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Multi-level model of the factors that affect the escalation of dust in Iraq
...Show More Authors

In this research The study of Multi-level  model (partial pooling model) we consider The partial pooling model which is one Multi-level  models and one of  the Most important models and extensive use and application in the analysis of the data .This Model characterized by the fact that the treatments take hierarchical or structural Form, in this partial pooling models, Full Maximum likelihood FML was used to estimated parameters of partial pooling models (fixed and random ), comparison between the preference of these Models, The application was on the Suspended Dust data in Iraq, The data were for four and a half years .Eight stations were selected randomly  among the stations in Iraq. We use Akaik′s Informa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 19 2025
Journal Name
Al–bahith Al–a'alami
Iraqi Satellite Music Channels and Their Role in Spreading Negative Values among University Youth
...Show More Authors

This study aims to clarify the role of Iraqi satellite channels in spreading negative values ​​among university youth; and the tendency of this segment to simulate the descending behaviors and pseudo-peculiar concepts of our society, which are displayed through the screens of these channels, based on the relevant media literature such as scientific references and the results of previous studies and research.

The study followed the survey methodology to examine the public based on the questionnaire as a research tool, which was distributed to a sample of male and female students of Baghdad University enrolled in the university for the academic year 2011-2012.

In order to achieve the specific objectives of this research

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 29 2018
Journal Name
Journal Of Planner And Development
اهمية تطبيق المعايير التخطيطية للفضاءات المفتوحة والخضراء ودورها في التخطيط الافضل للمدن
...Show More Authors

View Publication Preview PDF
Publication Date
Mon May 27 2019
Journal Name
Al-academy
The Use of Elements of Film Expression and their Role in Narrative Transitions: محمد أكرم عبد الجليل
...Show More Authors

Many studies and researches related to the audio and visual medium have shed light on the creative process that has taken place through them as well as the aesthetic and artistic creation and have dealt with many fields of knowledge and creativity in this field of art, which managed to study and follow its intellectual and technical tools for creating achievements through this medium, in its forefront come the elements of the cinematic language, which is characterized by possessing multiple features of aesthetic and semantic employment to reach the recipient as it is a tool of the artistic expression that gives the material it deals with aesthetic and intellectual dimensions from various aspects. "The artistic expression cannot be achiev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the theoretical framework of the REA accounting model Used in the design of accounting information systems
...Show More Authors

Researchers often equate database accounting models in general and the Resources-Events-Agents (REA) accounting model in particular with events accounting as proposed by Sorter (1969). In fact, REA accounting, database accounting, and events accounting are very different. Because REA accounting has become a popular topic in AIS research, it is important to agree on exactly what is meant by certain ideas, both in concept and in historical origin. This article clarifies the analyzing framework of REA accounting model and highlights the differences between the terms events accounting, database accounting, semantically-modeled accounting, and REA accounting. It als

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أهمية الإفصاح عن المعلومات المتعلقة بتدريب وتطوير العاملين وأثره في قرارات الاستثمار
...Show More Authors

يكتسب موضوع تدريب وتطوير العاملين أهمية بالغة في الظروف الاقتصادية الحالية التي تسودها مفاهيم وتوجهات جديدة كعولمة الاقتصاد ورأس المال المعرفي والفكري، وحيث صارت المعارف والمهارات والقابليات التي يمتلكها العاملون محركاً أساسياً باتجاه النجاح، وعنصراً مهماً في زيادة فاعلية منشأة الأعمال، وإدامة وجودها واستمرارها.

إن العاملين المدربين بشكل جيد على عمليات المنشأة وطبيعة المواد التي تستخدمها وإنتاجه

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref