Preferred Language
Articles
/
jperc-418
Standards and quality controls for information technology applications to serve the Holy Quran
...Show More Authors

the research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.

To achieve this goal, the researcher has built a list of criteria according to the following steps:

First - identify the key areas covered by the whole list which are:

1 – Standards of system building and implementing with the operating screens.

2 – Standards of display forms including audio and video presentation.

3 – Standards which are related to the program philosophy.

4 - Standards which are related to the program objectives.

5 - Standards which are related to the program content.

6 - Standards which are related to sources and learning strategies.
7 - Standards which are related to the program educational activities.

8 - Standards which are associated with the amending and immediate feedback.
9 - Standards which are associated to the learners.
10 - Standards which are related to the methods of interaction between the learner and the program.

11 - Standards which are related to technical aspects.

12 - Standards which are related to the administrative aspects of the production.

Secondly - the formulating of items: The researcher formulated items standard according to the areas they represent, and organized them in the form of a closed questionnaire which were in their first form like (17, 22, 18, 27, 33, 12, 15, 21, 23, 14, 19, 11) items. There items were arranged respectively according to their areas to become (232).

       And the resolution was presented to a group of educational arbitrators and specialists in technology, curriculum, teaching methods, educational technology, measurement and evaluation in Iraqi universities to determine the validity of each item and its suitability according its area. The researcher used three choices for each item (appropriate, inappropriate, need to be modified), and asked them to propose other additional items if it is required. The researcher has shown the experts that the arbitration process will be achieved according to the Delphi method of all three rounds to reach the highest level of scientific accuracy.

           The resolution has been processed by calculating the weighted average of each item in addition to the weight percentile according to the Fisher equation. All the items have an average above the value and a high weighted percentage in general. The items were re-ordered depending on the strength of each item and the value of Centennial weight. The expert mentioned observations and suggestions to amending item(s) or dissociate some of the items into two items. In addition to integrate some other items and delete others bringing the number of items to (210).

             Then the researcher transfer list of criteria to card calendar specific measured each item weight listed on the ladder graded four (excellent, very good, good, poor) were given weights following (0, 1, 2, 3) to evaluate the quality control standards for IT applications programmed To serve the Holy Quran.

The researcher codified items card in order to make sure its Validity to the attention of a number of arbitrators specialists in the field of technology and curriculum and teaching methods and educational technology and measurement and evaluation to express their point of view about the clarity of each item and whether they are true in the measure placed for him, has expressed Important Notes and the value of satisfied researcher by and conducted against which the necessary adjustments, bringing the number of items observation card (204) item have been calculated researcher Reliability of the card across individuals using the method of Cooper to calculate the coefficient of agreement between the observers and that counts the number of times the agreement and the number of times the difference between the observers, it is clear that all transactions fortitude to analyze researcher with the observed first , The researcher observed with the second, and first observed with the second Notably, a high rank as follows (84.8%, 86.9%, 89.7%), and this means that the analysis tool was a high level of consistency, which gives an indication of the possibility of using the tool.

       The researcher has developed some recommendations and a number of proposals to complement the current study.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 29 2020
Journal Name
International Journal Of Simulation: Systems, Science & Technology
A New Compact Microstrip Antenna for WSN Applications
...Show More Authors

View Publication
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Chalcogenide Letters
Copper telluride thin films for gas sensing applications
...Show More Authors

Scopus (4)
Scopus
Publication Date
Sun Nov 27 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The IMPACT of SOCIAL ACCOUNTING on The AUDITOR’S REPORT ACCORDING to INTOSAI STANDARDS: A STUDY OF EMPLOYEES' PERCEPTIONS FEDERAL BOARD of SUPERVISORY AUDIT IN IRAQ
...Show More Authors

This research investigates the importance of social accounting and the auditor’s report. It basically checks if there is an impact of social accounting on the auditor’s report at the availability the INTOSAI standards No. (1700 and 1706). The study recruited 105 employees of the Federal Financial Supervision Office in Iraq. Data were collected using questionnaire. The questionnaire validity and reliability were checked to assure the truthfulness of the findings. The study found a positive correlation and a statistically significant effect between the accounting for social responsibility and the auditor’s report. It is necessarily recommended for the auditor and the bodies working in the Board of Supreme Audit to ensure the inclusio

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
The issue of creation of AL-Muatazala and AL-Shaira
...Show More Authors

words of God the Quranic text , is genera words have many faces and connotations a ccording to references, cutures and Ages.That the Quranic text is fixed , But the connotations are moveable the scientists agreed about the miracle of the Qurantic text , But they differd of the Position of miracLe including the muatazala and Al- Ashaira who have adopted the idea of sytem and miracle of linguistic . Most of them were lingustics, grammerians and writers as: AL- Jahith, AL- Faraa Abivbeida , Ibn kutaba , AL -Rumani , AL -katabi , AL- Bakilaai , AL- Gargani and Others.
They also differed in what the words of Allaah mean . Is the Quranic text creature or updated ,it is the issue that exhausted the effort.of muslim scientists though its imbo

... Show More
View Publication Preview PDF
Publication Date
Tue May 28 2024
Journal Name
Investment Management And Financial Innovations
Bridging theory and practice: International valuation standards and asset valuation in the telecommunications sector
...Show More Authors

In the rapidly evolving telecommunications industry, accurate valuation of tangible assets remains a critical challenge that requires adherence to universally recognized standards. This study addresses the pressing need for transparent and precise asset valuation methodologies that are pivotal for informed investment decisions and financial reporting. It aims to bridge the theoretical and practical divide in asset valuation by applying International Valuation Standards (IVS) 300 and 400 to Asiacell Communications PJSC, a leading entity in the sector. Focusing on five key tangible assets from 2018 to 2022 – lands, buildings, plant and equipment, means of transport and transfer, and furniture and office equipment – the study emplo

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The usage of accounting information according to (Demerjian.et.al) model in order to measure the efficiency of industrial companies listed in the Iraqi Stock Exchange
...Show More Authors

The aim of the research is to measure the efficiency of the companies in the industrial sector listed in the Iraqi Stock Exchange , by directing these companies to their resources (inputs) towards achieving the greatest possible returns (outputs) or reduce those resources while maintaining the level of returns to achieve the efficiency of these companies, therefore, in order to achieve the objectives of the research, it was used (Demerjian.et.al) model to measure the efficiency of companies and the factors influencing them. The researchers had got a number of conclusions , in which the most important of them is that 66.6% of the companies in the research sample do not possess relatively high efficiency and that the combined factors (the nat

... Show More
View Publication
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Spe Middle East Oil And Gas Show And Conference
Evaluation of the Potentials for Adapting the Multistage Hydraulic Fracturing Technology in Tight Carbonate Reservoir
...Show More Authors
Abstract<p>Hydraulic fracturing is considered to be a vital cornerstone in decision making of unconventional reservoirs. With an increasing level of development of unconventional reservoirs, many questions have arisen regarding enhancing production performance of tight carbonate reservoirs, especially the evaluation of the potential for adapting multistage hydraulic fracturing technology in tight carbonate reservoirs to attain an economic revenue.</p><p>In this paper we present a feasibility study of multistage fractured horizontal well in typical tight carbonate reservoirs covering different values of permeability. We show that NPV is the suitable objective function for deciding on the optimum number</p> ... Show More
Scopus (28)
Crossref (22)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The redesign of the accounting system to banks in the local environment in accordance with international Islamic banking applications
...Show More Authors

At the local level in the early 1990s first established an Islamic bank 1993 is called Iraqi Islamic bank and was established by Dr. abdullatef hmim and with capital of 200 Million Iraqi dinars .

After 2003 began the attention of Iraqis tend to create Islamic banks until now up to 30 banks in the present ,  He confirmed Mr. Governor of the Iraqi Central Bank recently that there is more than 40 iintroduction licence to establish an Islamic bank in Iraq , That banking activity which is compatible with Sharia law widely welcomed by savers and those in need for more development and modernization in order to gain a greater share within the Iraqi market , and allowed the Iraqi Central Bank in recent years

... Show More
View Publication Preview PDF
Crossref