Preferred Language
Articles
/
jeasiq-1653
Intermediate Role Of information Technology In The Relationship To The Entrepreneurial Orientation and Success Factors Of The Project (Analytical exploratory research in Al – Zawraa General Company)
...Show More Authors

The purpose of the current research is to identify the reality and applicability of the entrepreneurial approach in its dimensions (creative, proactive, independent, risk tolerant, offensive) and its impact on the success factors of the project (organizational commitment, communication, project team, project monitoring) Access to information, treatment, storage), which is a significant and important link in the success and development of industrial projects with the possibility of studying and analyzing the provision of the appropriate environment for this.

 the research started from a problem expressed by a number of intellectual and practical questions aimed at answering them as well as To answer a number of questions and the most important - What is the reality of the pioneering dimensions of orientation in the company surveyed? , What are the most important factors in the success of the project in the company investigated? .

The objective of the research at the possibility of advancing the status of information technology in the company investigated, and make suggestions and recommendations to develop the role of the leading trend in achieving the success factors of the project.

The research included (7) main hypotheses, which were at the total level and at the sub-dimensions level, which show the correlation and influence between the search variables and to achieve the hypothesis tests applied to the research sample (the solar cell project in Al-Zorra General Company) adopted the questionnaire as the main tool for collecting data and information through (125) members out of (195).

 A well as conducting interviews with some of the respondents in question, where he met (15) managers distributed on the sections of Wa For the people and administrative units in the project. The data were analyzed using SPSS and a number of statistical methods were used to process the data including: arithmetic mean, percentage, standard deviation, variance coefficient, path analysis method, And the use of correlation coefficient (Pearson) to test the validity of correlation hypotheses and the use of simple linear regression coefficient to study the effect between the basic variables.

 The researcher also reached a set of results that important project by information technology and the changes that are made to the dimensions of leadership orientation followed by this change in other variables.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 15 2017
Journal Name
Ieee Sensors Journal
Calibrating Distance Sensors for Terrestrial Applications Without Groundtruth Information
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE OCCURRENCE OF THREE MONOGENEAN PARASITE SPECIES FOR THE FIRST TIME IN IRAQ ON GILLS OF THE COMMON CARP CYPRINUS CARPIO LINNAEUS, 1758 (CYPRINIFORMES, CYPRINIDAE)
...Show More Authors

    The monogeneans Gyrodactylus dzhalilovi Ergens & Ashurova, 1984, G. magnus Konovalov, 1967 and G. matovi Ergens & Kakachava-Avramova, 1966 were recorded in this study for the first time in Iraq from gills of the common carp Cyprinus carpio Linnaeus, 1758 collected from Tigris River in Baghdad city. The description, measurements and illustrations of these parasites were given.

View Publication Preview PDF
Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Pakistan Journal Of Medical & Health Sciences
Roles of Il-36 in the Pathogenesis of Inflammatory Bowel Disease in a Sample of Iraqi Patients
...Show More Authors

Publication Date
Mon Nov 24 2025
Journal Name
Journal Mustansiriyah Of Sports Science
Relationship between Cognitive style (risk taking VS Cautiousness) and performance of some ring skills for third stage female students in College of Physical Education and Sport Sciences / University of Baghdad
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Languages (jcl)
Новые направления и течения начала Серебряного века The Silver Age and the New Trends That appeared at the Twentieth Century.
...Show More Authors

    Годы, принадлежащие концу XIX – началу XX столетия, вошли в русскую литературу под красивым названием Серебряный век. В это время в стране появился целый ряд выдающихся поэтов, имена которых навсегда останутся в русской и мировой литературе. Это Ахматова, Гумилев, Блок, Маяковский и многие другие. Все эти люди творили в нелегкое для России время. Началом Серебряного века условно считают 189

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Economic analysis of the investment of human capital and the policy of privatization
...Show More Authors

The research problem is dedicated to investigate reservoirs irrational economic behavior adopted by the ruling elites in developing countries about the investment methodology of human capital and operating policies is based on the terms of reference of economic theory and standards governing the market, which led to a chronic structural imbalance in the workforce structure and lack of consistency with different production structure, in turn, which had a reported effects in the emergence of the phenomenon of unemployment and that they involved a certain privacy, as has become the issues of unemployment and employment in the various countries of the world are issues more important due to the presence of large numbers of the workforce in th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
An Overview of How the Petrophysical Properties of Rock Influenced After Being Exposed to Cryogenic Fluid
...Show More Authors

Exposure to cryogenic liquids can significantly impact the petrophysical properties of rock, affecting its density, porosity, permeability, and elastic properties. These effects can have important implications for various applications, including oil and gas production and carbon sequestration. Cryogenic liquid fracturing is a promising alternative to traditional hydraulic fracturing for exploiting unconventional oil and gas resources and geothermal energy. This technology offers several advantages over traditional hydraulic fracturing, including reduced water consumption, reduced formation damage, and a reduced risk of flow-back fluid contamination. In this study, an updated review of recent studies demonstrates how the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref