Preferred Language
Articles
/
jeasiq-664
A conceptual Framework For the Relationship between Human and Social Capital
...Show More Authors

Purpose: The research seeks to develop the implications of intellectual human capital, and social capital in business organizations, and will be accomplished on three levels, the first level (the level of description) to identify, diagnose and display content philosophical Strategic Human Resource Management at the thought of modern administrative represented by human capital and Ras social capital. The second level (level of analysis) and the analysis of the extent of the impact of alignment between human capital, and social capital in the organizational strength of the organizations. The third level (Level predict) the formulation of a plan to strengthen the organizational strength in business organizations and to develop specific predictions about the nature of the appropriate relationship between the variables researched.

Find a problem: the problem of summarizing a set of research questions, and it was the most important: Is there a relationship between human capital and social capital? Does human capital through social counterpart in organizational strength, the biggest impact at the impact of social capital across the human counterpart in organizational strength? Or vice versa?

Originality / value: undertake this research with the help of managers in business organizations to address the challenge of strengthening the organizational strength, through the alignment between human capital, and social capital

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Cox proportion hazard model for patients with hepatitis disease in Iraq
...Show More Authors

Cox regression model have been used to estimate proportion hazard model for patients with hepatitis disease recorded in Gastrointestinal and Hepatic diseases Hospital in Iraq for (2002 -2005). Data consists of (age, gender, survival time terminal stat). A Kaplan-Meier method has been applied to estimate survival function and hazerd function.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 08 2016
Journal Name
Methods In Molecular Biology
Production of Adjuvant-Loaded Biodegradable Particles for Use in Cancer Vaccines
...Show More Authors

View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Nov 09 2020
Journal Name
Construction Research Congress 2020
Alternative Risk Models for Optimal Investment in Portfolio-Based Community Solar
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 22 2016
Journal Name
Brazilian Journal Of Physics
Alpha Decay Preformation Factors for Even–Even 280–316116 Superheavy Isotopes
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 26 2019
Journal Name
Journal Of Contemporary Medical Sciences
Breast Cancer Decisive Parameters for Iraqi Women via Data Mining Techniques
...Show More Authors

Objective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
مجلة كلية الكوت الجامعة للعلوم الإنسانية
Student - Teacher Environmental Sustainability Values College of Education for Pure Sciences
...Show More Authors

Research objective to identify the degree of environmental sustainability values of the student-teacher in the College of Education for Pure Sciences. In this research the methodology of relational descriptive research was adopted, and the research sample consisted of (116) students from the College of Education for Pure Sciences / Ibn Al-Haytham / University of Baghdad From the Department of Chemistry (fourth stage), that is, 54% of the research community were randomly selected. The research tool was prepared, represented by a measure of environmental sustainability values of (20) items, the results of the research showed: The poor degree of environmental sustainability values. The Statistical Portfolio of Social Sciences (SPSS) was adopte

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Proceedings Of The 17th Laccei International Multi-conference For Engineering, Education, And Technology: “industry, Innovation, And Infrastructure For Sustainable Cities And Communities”
Type Curve Techniques for Hydraulically Fractured Wells in Tight Gas Reservoir
...Show More Authors

View Publication
Scopus Crossref