Preferred Language
Articles
/
jih-2294
Surveying the Organization of Digital Contents in the Internet Environments Using Ontological Approaches
...Show More Authors

     Ontology is a system for classifying human knowledge according to its objective characteristics and hierarchical relations through building clusters or that bear common characteristics. In digital environments, it is a mechanism that helps regulate a vast amount of information by achieving a complete link between sub-thematic concepts and their main assets. The purpose of this study is to survey the previously conducted studies that use ontology in organizing digital data on social networking sites, such as the search engines Yahoo, Google, and social networks as Facebook and their findings. Results have shown that all these studies invest ontology for the purpose of organizing digital content data, especially on the Internet sites.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Strategic Intelligence in High performance organization A Survey Study for the Managers of Diseases and Kidney Transplant Center/ Medicine City-Baghdad
...Show More Authors

The topic of strategic intelligence is considered as important topics that acquires the attention of organizations, Because of its role in supplying the decision-making centers by strategic ideas according to the opportunities and threats facing the organization, in an effort to improve the performance of their organizations to reach the high performance organization.

A lot of organizations lack to strategy guides the strategic intelligence towards achieving high performance organization.

This research aims to determine the level of strategic intelligence that characterized the leaders of diseases and kidney transplant center in Medicine city. What is the application level of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Thu Apr 24 2025
Journal Name
Journal Of The College Of Basic Education
Addiction to the Internet and its relation to the mental alertness of students of the Faculty of Physical Education and Sports Science for Girls
...Show More Authors

View Publication
Publication Date
Fri Oct 01 2021
Journal Name
Saudi Pharmaceutical Journal
Organization factors influencing nurse ability to prevent and detect adverse drug events in public hospitals using a patient safety model
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
" employees voices behaviors: Theoretical concepts and thinking approaches
...Show More Authors

The concept of employees voice has received a great deal of attention by researchers in the field of organizational behavior and human resources management especially in the last three decades of the twentieth century , this importance has deep ranges limits in terms of its discussion history, so it became a behavioral variable received a great attention and care in managerial and organizational studied and basic pillar in the success and excellence of organizations in maintaining its human resources, the research explain the concept and benefits of paying attention to the voice of employees in business organizations , and the theories interpreted to employees voicing and clearing the motivations behind employees voicing, and dis

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Wed Oct 18 2023
Journal Name
Ieee Access
A New Imputation Technique Based a Multi-Spike Neural Network to Handle Missing Data in the Internet of Things Network (IoT)
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Dec 24 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Comparison of Phenolic Contents and Antioxidant Activities for Black and White Desert Truffles Spread in Syria
...Show More Authors

Desert truffle is considered as a type of Syrian wild fungi that spreads heavily, and it occupies important rank in folk medicine, where its aqueous extract is used for the treatment of some eye and skin illnesses, and people prefer the use of black truffle. This work interested in studying of the most available species; Terfezia claveryi (black) and Tirmania pinoyi (white). The extracts of the two species of truffle were prepared by maceration with water, methanol, and ethanol 70%. Their total phenolic contents (TPC) and total flavonoid contents (TFC) were analyzed using Folin-ciocalteu and Aluminum chloride methods respectively, and their antioxidant activities was tested using 2,2-diphenyl-1-picrylhydrazyl (DPPH) and

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Thu Sep 20 2018
Journal Name
Www.intechopen.com
Internet of Things (IoT) for Automated and Smart Applications
...Show More Authors

Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader u

... Show More
View Publication