Preferred Language
Articles
/
jeasiq-862
Developing Human Capital according to the Communities of Practice: A comparative study by using Data Envelopment Analysis
...Show More Authors

The research discusses the need to find the innovative structures and methodologies for developing Human Capital (HC) in Iraqi Universities. One of the most important of these structures is Communities of Practice (CoPs) which contributes to develop HC by using learning, teaching and training through the conversion speed of knowledge and creativity into practice. This research has been used the comparative approach through employing the methodology of Data Envelopment Analysis (DEA) by using (Excel 2010 - Solver) as a field evidence to prove the role of CoPs in developing HC. In light of the given information, a researcher adopted on an archived preliminary data about (23) colleges at Mosul University as a deliberate sample for this research. The research has reached several conclusions and suggestions, the most important of which: Reading the vision about the CoPs roles allows for officials of developing HC to get to know the frames that increases the efficiency of CoPs' performance, besides increases the CoPs' value in order to support for the development process. Also, the flexibility of DEA methodology make it as one of the most important of analytical models in the process of measurement and comparison, especially if we know that the concepts of developing HC focusing on outputs rather than inputs, as well as the DEA supports the orientation to outputs, besides towards input for measurement, comparison and optimization. This research suggests two directions in the future studies, the first are expanding the number of factors and indicators within the proposed analytical model, and the second direction is studying the timeframes for efficiency in colleges. Therefore, these directions will leads to several studies that include: the comparison among colleges that are similar in terms of knowledge domain locally, regionally and globally, besides studying the different timeframes to promote the Arab and international competition for these colleges.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2006
Journal Name
Journal Of The College Of Languages (jcl)
Demonstratives in English and Arabic : A Contrastive Study
...Show More Authors

This paper studies the demonstratives as deictic expressions in Standard Arabic and English by outlining their phonological, syntactic and semantic properties in the two languages. On the basis of the outcome of this outline, a contrastive study of the linguistic properties of this group of deictic expressions in the two languages is conducted next. The aim is to find out what generalizations could be made from the results of this contrastive study.

View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the path analysis method to diagnoseFactors influencing the intentions of the employees of the University of Dhi Qar To introduce Internet behavior
...Show More Authors

The purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model For Using Customer's Data Management Information System/ A Case Study In Al-Rasheed Bank/General Agent Office/ Nothren Reigon
...Show More Authors

This study aim to  identify the concept of  web based information systems since its one of the important topics that is  usually omitted by our organizations, in addition to,  designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.

This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Data Mining Methods for Extracting Rumors Using Social Analysis Tools
...Show More Authors

       Rumors are typically described as remarks whose true value is unknown. A rumor on social media has the potential to spread erroneous information to a large group of individuals. Those false facts will influence decision-making in a variety of societies. In online social media, where enormous amounts of information are simply distributed over a large network of sources with unverified authority, detecting rumors is critical. This research proposes that rumor detection be done using Natural Language Processing (NLP) tools as well as six distinct Machine Learning (ML) methods (Nave Bayes (NB), random forest (RF), K-nearest neighbor (KNN), Logistic Regression (LR), Stochastic Gradient Descent (SGD) and Decision Tree (

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
A comparative study to determine the native eye lens protein in the some types of Iraqi vertebrates
...Show More Authors

This study showed that the lens in baloot muluki fish Chondrostoma regium is transparent, spherical shape, and solid in textures, while in the tree frog Hyla arborea savignyi, freshwater turtles Clemmys caspia caspia, white–eared bulbul Pycnonotus leucotis and brown rat Rattus norvegicus are transparent, soft and biconvex, it is very soft in white–eared bulbul. There are many significant differences have been recorded between the average weight lens and the total concentration of the protein in the lens all studied animals. Electrical migration process for lens proteins showed that there is one bundle of crystalline –? and one bundle also crystalline–? in all studied species, either crystalline–? may represent one bundle character

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Extent of Applying Corporate Governance Requirements According to International Specification (ISO 26000:2010) in the National Insurance Company: A Research Application
...Show More Authors

Abstract

                The research aims to identify the application of corporate governance requirements according to the international standard (ISO 26000:2010) in the National Insurance Company. Strengths and weaknesses were identified to study the current state of this requirement's application in the company under investigation. The descriptive-analytical approach was utilized through a checklist derived from ISO 26000:2010. Several personal interviews and field visits were conducted to understand the extent of application and documentation based on various statistical methods. The results revealed a level of applic

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
The International Journal Of Nonlinear Analysis And Applications
Developing Bulk Arrival Queuing Models with Constant Batch Policy Under Uncertainty Data Using (0-1) Variables
...Show More Authors

This paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional b

... Show More
Publication Date
Wed Jun 14 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ATTITUDE OF OFFICIALS IN THE INDUSTRIAL COMPANY TOWARDS THE PRACTICE OF REVERSE/ AN APPLIED STUDY IN BAGHDAD COMPANY FOR SOFT DRINKS.: ATTITUDE OF OFFICIALS IN THE INDUSTRIAL COMPANY TOWARDS THE PRACTICE OF REVERSE/ AN APPLIED STUDY IN BAGHDAD COMPANY FOR SOFT DRINKS.
...Show More Authors

This paper deals with the subject of demarcating as appropriate scientific techniques to rationalize consumption and to control segments of the society for the technical conduct of its handling of the product depending on the mix of elements (product and the volume of demand, Price, promotion and distribution), but inverse manner designed to adjust the working condition of balance between supply and demand and to ensure that rates continue in the marketing process properly, and therefore the research aims to shed light on some of the practices that reflect the Demarketing techniques, As well as the statement of the reality of attitudes towards the practice of those techniques through a sample survey of officials in Baghdad company for so

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
Terrorism and its impact on the right of Human in development - A study case of ISIS (Daesh) in Iraq
...Show More Authors

       Iraq is one of the most important countries in the world that has received its share of terrorist acts by the terrorist organization the Islamic State of Iraq and al-Sham (ISIS), which has caused instability, especially during the period of ISIS's control of seven Iraqi provinces (2014-2017). This stage has caused a decline in the levels of human and economic development and its inconsistency with the capabilities and needs of the Iraqi population. Therefore, this study aims to investigate the hypothesis that there is a close relationship between the decline in development in Iraq and the brutal practices of ISIS that it committed during his period of control over many Iraqi cities and regions. This study used several method

... Show More
View Publication Preview PDF
Crossref