Preferred Language
Articles
/
jperc-418
Standards and quality controls for information technology applications to serve the Holy Quran
...Show More Authors

the research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.

To achieve this goal, the researcher has built a list of criteria according to the following steps:

First - identify the key areas covered by the whole list which are:

1 – Standards of system building and implementing with the operating screens.

2 – Standards of display forms including audio and video presentation.

3 – Standards which are related to the program philosophy.

4 - Standards which are related to the program objectives.

5 - Standards which are related to the program content.

6 - Standards which are related to sources and learning strategies.
7 - Standards which are related to the program educational activities.

8 - Standards which are associated with the amending and immediate feedback.
9 - Standards which are associated to the learners.
10 - Standards which are related to the methods of interaction between the learner and the program.

11 - Standards which are related to technical aspects.

12 - Standards which are related to the administrative aspects of the production.

Secondly - the formulating of items: The researcher formulated items standard according to the areas they represent, and organized them in the form of a closed questionnaire which were in their first form like (17, 22, 18, 27, 33, 12, 15, 21, 23, 14, 19, 11) items. There items were arranged respectively according to their areas to become (232).

       And the resolution was presented to a group of educational arbitrators and specialists in technology, curriculum, teaching methods, educational technology, measurement and evaluation in Iraqi universities to determine the validity of each item and its suitability according its area. The researcher used three choices for each item (appropriate, inappropriate, need to be modified), and asked them to propose other additional items if it is required. The researcher has shown the experts that the arbitration process will be achieved according to the Delphi method of all three rounds to reach the highest level of scientific accuracy.

           The resolution has been processed by calculating the weighted average of each item in addition to the weight percentile according to the Fisher equation. All the items have an average above the value and a high weighted percentage in general. The items were re-ordered depending on the strength of each item and the value of Centennial weight. The expert mentioned observations and suggestions to amending item(s) or dissociate some of the items into two items. In addition to integrate some other items and delete others bringing the number of items to (210).

             Then the researcher transfer list of criteria to card calendar specific measured each item weight listed on the ladder graded four (excellent, very good, good, poor) were given weights following (0, 1, 2, 3) to evaluate the quality control standards for IT applications programmed To serve the Holy Quran.

The researcher codified items card in order to make sure its Validity to the attention of a number of arbitrators specialists in the field of technology and curriculum and teaching methods and educational technology and measurement and evaluation to express their point of view about the clarity of each item and whether they are true in the measure placed for him, has expressed Important Notes and the value of satisfied researcher by and conducted against which the necessary adjustments, bringing the number of items observation card (204) item have been calculated researcher Reliability of the card across individuals using the method of Cooper to calculate the coefficient of agreement between the observers and that counts the number of times the agreement and the number of times the difference between the observers, it is clear that all transactions fortitude to analyze researcher with the observed first , The researcher observed with the second, and first observed with the second Notably, a high rank as follows (84.8%, 86.9%, 89.7%), and this means that the analysis tool was a high level of consistency, which gives an indication of the possibility of using the tool.

       The researcher has developed some recommendations and a number of proposals to complement the current study.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Oct 26 2017
Journal Name
International Journal Of Pure And Applied Mathematics
ON CONVEX FUNCTIONS, $E$-CONVEX FUNCTIONS AND THEIR GENERALIZATIONS: APPLICATIONS TO NON-LINEAR OPTIMIZATION PROBLEMS
...Show More Authors

Contents IJPAM: Volume 116, No. 3 (2017)

View Publication
Publication Date
Sun Jul 23 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
UTILIZATION OF MODIFIED ATMOSPHERE PACKAGING TO EXTEND SHELF LIFE AND MAINTAIN QUALITY OF KHALAL BARHI DATES: UTILIZATION OF MODIFIED ATMOSPHERE PACKAGING TO EXTEND SHELF LIFE AND MAINTAIN QUALITY OF KHALAL BARHI DATES
...Show More Authors

Barhi dates fruit are one of the most important date palm cultivars which are some of their properties they are mostly eaten and sold at the khalal stage when it has become yellow compared with rutab stage. At this stage the fruit loses its astringency and becomes sweet and best texture, therefore. High moisture content and rapid ripening of Barhi dates shorten their shelf life, as well the Khalal stage lasts for about 4 weeks until the ripening of the fruits begins and transfer to rutab stage. In the present study, Barhi dates packaging in the first by common air - packaging and
second by Modified atmosphere packaging, MAP A (5% O2 + 20% CO2) and MAP B (40%O2+20%CO2) and stored for 30 days at different temperatures 5 and 20 °C, re

... Show More
View Publication
Publication Date
Sun Mar 01 2020
Journal Name
Materials Research Express
Spray pyrolysis of graphene oxide based composite for optical and wettability applications
...Show More Authors
Abstract<p>In this study, silica-graphene oxide nano–composites were prepared by sol-gel technique and deposited by spray pyrolysis method on glass substrate. The effect of changing the graphene/silica ratio on the optical properties and wetting of these nano–structures has been investigated. The structural and morphological properties of the thin films have been studied by x-ray diffraction spectroscopy (XRD), field emission scanning electron microscope (FESEM), energy dispersive x-ray spectroscopy (EDS) and atomic force microscope (AFM). XRD results show that silica structures present in the synthesized films exhibit amorphous character and there is a poor arrangement in graphene plates al</p> ... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Mar 05 2025
Journal Name
Lecture Notes In Networks And Systems
Leveraging AI for Disaster Management: A Comprehensive Review of Applications and Challenges
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 28 2021
Journal Name
Journal Of Engineering
A Ultra-broadband Thin Metamaterial Absorber for Ku and K Bands Applications
...Show More Authors

In this paper, a design of the broadband thin metamaterial absorber (MMA) is presented. Compared with the previously reported metamaterial absorbers, the proposed structure provides a wide bandwidth with a compatible overall size. The designed absorber consists of a combination of octagon disk and split octagon resonator to provide a wide bandwidth over the Ku and K bands' frequency range. Cheap FR-4 material is chosen to be a substate of the proposed absorber with 1.6 thicknesses and 6.5×6.5 overall unit cell size. CST Studio Suite was used for the simulation of the proposed absorber. The proposed absorber provides a wide absorption bandwidth of 14.4 GHz over a frequency range of 12.8-27.5 GHz with more than %90 absorp

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Planner And Development
The effect of urban obsolescence on the quality of the built environment for historical quarters
...Show More Authors

             The centers of cities and historical quarter are exposed to a severe threat to the values of the physical and legal urban environment as a result of the value deterioration and the emergence, emergence and spread of new values on the intellectual and urban context, which generates the loss of the urban environment for its spatio-temporal continuity, flexibility, adaptation and continuity, and thus urban obsolescence, Hence the problem of the research in “the lack of comprehensiveness of studies on the phenomenon of urban obsolescence and its impact on the decline in the values of the quality of the built environment in historic

... Show More
View Publication Preview PDF