Preferred Language
Articles
/
jperc-418
Standards and quality controls for information technology applications to serve the Holy Quran
...Show More Authors

the research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.

To achieve this goal, the researcher has built a list of criteria according to the following steps:

First - identify the key areas covered by the whole list which are:

1 – Standards of system building and implementing with the operating screens.

2 – Standards of display forms including audio and video presentation.

3 – Standards which are related to the program philosophy.

4 - Standards which are related to the program objectives.

5 - Standards which are related to the program content.

6 - Standards which are related to sources and learning strategies.
7 - Standards which are related to the program educational activities.

8 - Standards which are associated with the amending and immediate feedback.
9 - Standards which are associated to the learners.
10 - Standards which are related to the methods of interaction between the learner and the program.

11 - Standards which are related to technical aspects.

12 - Standards which are related to the administrative aspects of the production.

Secondly - the formulating of items: The researcher formulated items standard according to the areas they represent, and organized them in the form of a closed questionnaire which were in their first form like (17, 22, 18, 27, 33, 12, 15, 21, 23, 14, 19, 11) items. There items were arranged respectively according to their areas to become (232).

       And the resolution was presented to a group of educational arbitrators and specialists in technology, curriculum, teaching methods, educational technology, measurement and evaluation in Iraqi universities to determine the validity of each item and its suitability according its area. The researcher used three choices for each item (appropriate, inappropriate, need to be modified), and asked them to propose other additional items if it is required. The researcher has shown the experts that the arbitration process will be achieved according to the Delphi method of all three rounds to reach the highest level of scientific accuracy.

           The resolution has been processed by calculating the weighted average of each item in addition to the weight percentile according to the Fisher equation. All the items have an average above the value and a high weighted percentage in general. The items were re-ordered depending on the strength of each item and the value of Centennial weight. The expert mentioned observations and suggestions to amending item(s) or dissociate some of the items into two items. In addition to integrate some other items and delete others bringing the number of items to (210).

             Then the researcher transfer list of criteria to card calendar specific measured each item weight listed on the ladder graded four (excellent, very good, good, poor) were given weights following (0, 1, 2, 3) to evaluate the quality control standards for IT applications programmed To serve the Holy Quran.

The researcher codified items card in order to make sure its Validity to the attention of a number of arbitrators specialists in the field of technology and curriculum and teaching methods and educational technology and measurement and evaluation to express their point of view about the clarity of each item and whether they are true in the measure placed for him, has expressed Important Notes and the value of satisfied researcher by and conducted against which the necessary adjustments, bringing the number of items observation card (204) item have been calculated researcher Reliability of the card across individuals using the method of Cooper to calculate the coefficient of agreement between the observers and that counts the number of times the agreement and the number of times the difference between the observers, it is clear that all transactions fortitude to analyze researcher with the observed first , The researcher observed with the second, and first observed with the second Notably, a high rank as follows (84.8%, 86.9%, 89.7%), and this means that the analysis tool was a high level of consistency, which gives an indication of the possibility of using the tool.

       The researcher has developed some recommendations and a number of proposals to complement the current study.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Thu Oct 01 2015
Journal Name
Al–bahith Al–a'alami
Communicative Applications in the Websites of the Iraqi Political Parties and their Role in Providing Opportunities for Political Participation
...Show More Authors

The present study deals with the websites of Iraqi political parties on the internet to identify the effectiveness in providing communicative applications that help audience to participate, express their opinions, their positions, and other aspects reflecting the extent of employing modern technological tools to allow opportunities for political, and democratic participation since the internet has become an effective tool for political communications of political parties. The research sample includes eight political parties. The research concludes that the Iraqi political parties do not employ interactive communication patterns to reflect their interests in communicating with the public, providing opportunities for their participation an

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Symbolism in Architecture and Arts of the Holy Shrines: صادق هاشم حسن الموسوي
...Show More Authors

  The current research is interested in studying the symbol, due to its significant role in the architecture and arts in the holy shrines regardless of their architecture and artistic patterns, through which the symbolic and philosophical connotations insides the holy shrines are revealed. Due to the importance of the topic of the symbol, Almighty God remarked in the holy Quran (He said, "My Lord, make for me a sign." He Said, "Your sign is that you will not [be able to] speak to the people for three days except by gesture. And remember your Lord much and exalt [Him with praise] in the evening and the morning.") (Surat Al-Imran, verse 41). The research consists of two dimensions dealing with symbol and symbolism in its linguistic an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Test Engineering & Management
The Effects of Annealing on SnSe Thin Films for Solar Cells Applications
...Show More Authors

The structure, optical, and electrical properties of SnSe and its application as photovoltaic device has been reported widely. The reasons for interest in SnSe due to the magnificent optoelectronic properties with other encouraging properties. The most applications that in this area are PV devices and batteries. In this study tin selenide structure, optical properties and surface morphology were investigated and studies. Thin-film of SnSe were deposit on p-Si substrates to establish a junction as solar cells. Different annealing temperatures (as prepared, 125,200, 275) °C effects on SnSe thin films were investigated. The structure properties of SnSe was studied through X-ray diffraction, and the results appears the increasing of the peaks

... Show More
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Using the plastic wastes in fabrication of composite materials for different applications
...Show More Authors

This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
easurement & Analyses costs of quality& effect in strategic performance: An Application research in construction industry– Saad public company
...Show More Authors

Many economic entities working in multiple industrial fields suffer fromlow techniques in using modern administrative means in their works. The mostused tool in measuring required procedures is to adopt and use quality costs. inspite of complications and bronchial of operations in construction projects, Theresearcher was able to find a structure to quality costs according to traditionclassification (prevention, Appraisal, failure) which enables the calculation ofthese costs and then analyze results and setting standards which can beimplemented in evaluating strategic performance for targeted project. and theforge research in theoretical fly to quality and costs concerning it inconstruction section , as well as strategically performance a

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The redesign of the accounting system to banks in the local environment in accordance with international Islamic banking applications
...Show More Authors

At the local level in the early 1990s first established an Islamic bank 1993 is called Iraqi Islamic bank and was established by Dr. abdullatef hmim and with capital of 200 Million Iraqi dinars .

After 2003 began the attention of Iraqis tend to create Islamic banks until now up to 30 banks in the present ,  He confirmed Mr. Governor of the Iraqi Central Bank recently that there is more than 40 iintroduction licence to establish an Islamic bank in Iraq , That banking activity which is compatible with Sharia law widely welcomed by savers and those in need for more development and modernization in order to gain a greater share within the Iraqi market , and allowed the Iraqi Central Bank in recent years

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Effect of IFRS 16 on the quality of financial reporting For the Iraqi economic units Applied to the General Company of Iraqi Airways
...Show More Authors

The rental activity receives "significant" interest from accounting organizations interested in issuing accounting standards worldwide, such as the Financial Accounting Standards Board (FASB), the International Accounting Standards Board (IASB). As leases represents an important source of finance for economic units as an alternative to financing assets through purchase or borrowing. Professional organizations have focused on addressing the situation of extra-budgetary funding through which the lessee hides many leases that are classified as financing without It shows in the budget, which gives an incorrect picture of the reality of the financial situation of economic unity, IASB has issued IFRS 16, which terminates off- Balance s

... Show More
View Publication Preview PDF
Crossref