Preferred Language
Articles
/
jeasiq-435
Using Public and Private Cloud Computing in developing the Evaluation System of annual employees' performance at Iraqi Universities: A comparative study
...Show More Authors

Abstract

Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aims to provide a sophisticated model that depends on these solutions for improving the performance of ESAEP at Iraqi universities. We used the case study approach to read the reality of the environment of old ESAEP and determining its development requirements in the light of using CC. In addition, we used the comparative approach to determine the achieved feasibility of the target development process. The tools that used in this paper includes Hardware (like: servers and laptops), Software (like: Share Point Ser. 2013), Applications (like: Google Sheets) and the Communication Technologies, as well as we used the PERT method in conducting a comparison between the old system and the proposal new system. The paper has reached several conclusions and suggestions, the most important of which: The existing ESAEP in Iraqi universities is not effective system, because of its non-reliance on Information and Communication Technologies in an integrated manner, thus was born a problem of the duplication of handwork and Semi-electronic work. By using the public and private CC, the developer new system enables to reduce the required working hours for the completion of evaluation activities in the old system at a rate of (158.88%), due to the proposed new system's ability to solve the previous problem and therefore its adoption only on the electronic work. We urged the Iraqi universities to implement one of the proposed developmental models (using public or private CC) in the light of the desired features of each model as well as the implementation requirements. Furthermore, it is necessary to update and develop the computer and Internet centres at Iraqi universities in terms of achievement new tasks and responsibilities.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The concept of violence in political thought (Theoretical study, compared with the concept of terrorism)
...Show More Authors

The researcher of human history finds that the first social relations on earth were represented by the violence of Adam, peace be upon him, Cain and Abel. Violence has been a phenomenon of life and society. The history of history is full of all forms of violence and its forms. It speaks of cruelty, oppression and states. History began, in some of its chapters, written with the blood of the victims. It is a testimony to the cruelty of human beings. His human nature and his sin have played a major role that can not be overlooked in the development of important and fundamental developments in some historical turning points where violence was a necessity for life, and its launching change, renewal and reform, and major revolutions in human h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 25 2023
Journal Name
Plos One
Organizational and behavioral attributes’ roles in adopting cloud services: An empirical study in the healthcare industry
...Show More Authors

The need for cloud services has been raised globally to provide a platform for healthcare providers to efficiently manage their citizens’ health records and thus provide treatment remotely. In Iraq, the healthcare records of public hospitals are increasing progressively with poor digital management. While recent works indicate cloud computing as a platform for all sectors globally, a lack of empirical evidence demands a comprehensive investigation to identify the significant factors that influence the utilization of cloud health computing. Here we provide a cost-effective, modular, and computationally efficient model of utilizing cloud computing based on the organization theory and the theory of reasoned action perspectives. A tot

... Show More
View Publication
Scopus (3)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
The Impact of Educational Techniques in Developing Teaching Skills of Apprentice Students in the Faculty of Fine Arts - Diyala University: عمر قاسم علي - رجاء حميد رشيد
...Show More Authors

For the purpose of achieving the desired goal of the educational learning process, it was necessary to devote attention to educational means and employ them in this field because of their great role in overcoming the difficulties facing the learning process and providing an educational environment that keeps abreast of the scientific developments. This is the goal of the research in which the researchers wanted to know the effect of the educational techniques in the development of apprentice students' skills in teaching.
The research consisted of the problem of the research which is: what is the impact of educational techniques on developing the apprentice students' teaching skills in the Faculty of Fine Arts? In addition to its imp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Comparison Study in Sarcasm For University of Baghdad Staff
...Show More Authors

Sarcasm is conceders one patterns of undesirable communication, which causes social problems in humans relationships because of the contradictory verbal and nonverbal expressions is known sarcasm may defined , statements with intent to belittle others in different situations, dealing with the individual deliberately, to diminish the will or overwhelmed by the recipe stupid, which generate a reaction when a person listener, raising the intentions of ridicule and undermine it, and this may happen is different from the irony interest increased in sarcasm since the development of scientists "Watzlawick '" and Bevin "Jackson's" in 1967 theory interactive and considered the sarcasm one interaction patterns in the social relationship, which use

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
A Study of Some Physical Properties for Binary System of Cyclohexane with n-decane and 1-pentanol at Different Temperatures
...Show More Authors

mixtures of cyclohexane + n-decane and cyclohexane + 1-pentanol have been measured at 298.15, 308.15, 318.15, and 328.15 K over the whole mole fraction range. From these results, excess molar volumes, VE , have been calculated and fitted to the Flory equations. The VE values are negative and positive over the whole mole fraction range and at all temperatures. The excess refractive indices nE and excess viscosities ?E have been calculated from experimental refractive indices and viscosity measurements at different temperature and fitted to the mixing rules equations and Heric – Coursey equation respectively to predict theoretical refractive indices, we found good agreement between them for binary mixtures in this study. The variation of th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 30 2025
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Optimum design and performance analysis of a gas lift system in the carbonate reservoir of Ahdab oil field
...Show More Authors

   Gas lift is one of the most important artificial lift methods for increasing oil production, as wells often require this method after the reservoir's energy has decreased. In this research, an optimal gas lift system is designed for five horizontal wells in the Ahdab oil field, which suffers from low production. At the same time, water cut in some of these wells reaches 66%, while the productivity index is low in others, which makes the challenges clear, and a deep analysis is needed to find an optimal system. The Pipesim program is used to design the optimal gas lift system, which contains features that facilitate the implementation of the appropriate design and provide the ability to analyze and determine the optimal design v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Disclosure of insurance services and its impact: On the performance of companies
...Show More Authors

The objective of the research is to identify the nature of voluntary disclosure of insurance services and its impact on the financial performance of Iraqi insurance companies by knowing the relationship between increasing disclosure of financial services and financial performance indicators of insurance companies.In order to achieve this objective, the research was applied to a sample of the Iraqi insurance companies listed in the Iraqi Stock Exchange (Al Amin Insurance Company, Al Ahlia Insurance, Dar Al Salam Insurance, Gulf Insurance, Al Hamra Insurance) and based on their published financial statements (2014-2015) ) And by analyzing the sample lists were connected to the research objectives.The main conclusion of the study is that in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 23 2020
Journal Name
2020 International Conference On Advanced Science And Engineering (icoase)
A Comparative Study Using LZW with Wavelet or DCT for Compressing Color Images
...Show More Authors

As a result of the significance of image compression in reducing the volume of data, the requirement for this compression permanently necessary; therefore, will be transferred more quickly using the communication channels and kept in less space in memory. In this study, an efficient compression system is suggested; it depends on using transform coding (Discrete Cosine Transform or bi-orthogonal (tap-9/7) wavelet transform) and LZW compression technique. The suggested scheme was applied to color and gray models then the transform coding is applied to decompose each color and gray sub-band individually. The quantization process is performed followed by LZW coding to compress the images. The suggested system was applied on a set of seven stand

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of The College Of Languages (jcl)
Investigating EFL Iraqi College Students' Awareness of Euphemistic Expressions
...Show More Authors

All over the world and in different societies and cultures , people are always looking for different ways of favourable , gentle smooth and soft communication .The 'powerful linguistic devices ' that are embedded in the daily English language is called "euphemism". It plays an important and vital role in daily communication. It represents a significant part of English . It is used to express any aspect of everyday realities such as the business world , mass media , etc. The comprehension of such realities can not be verified unless a reasonable command of euphemism is achieved.
Euphemism is defined according to various perspectives and views. It is " that figure of speech which consists in the substitution of a word or expression of c

... Show More
View Publication Preview PDF