The study aims to introduce the Islamic sites available on the Internet and determine the criteria that contribute to evaluating these sites to indicate their value, topics, and services, while evaluating a simple random sample of the general Islamic sites, which number (35) sites. The results were presented in (8) tables. The study concluded To a set of conclusions, including: (465) “Islamic” websites were seized during the research period, and they are constantly increasing. They were classified according to the name of the website (domain name) com, org, net, edu, and also according to topics such as general Islamic websites and websites of holy places. Mosques, sites of sheikhs, etc. Among the best general Islamic websites are: Islam, the Islamic Network, and Islam Online.
Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r
... Show MoreElectronic banking plays a prominent role in providing the best banking services and upgrading the banking sector for the better, so this study aimed to shed light on the most prominent obstacles that prevent the application of electronic banking in banks operating in the city of Nasiriyah, and in order to achieve this goal the researcher used the descriptive analytical approach And through a questionnaire form that was distributed to a group of employees, numbering (60) employees in the upper, middle and operational departments in a number of branches of private banks operating in the city of Nasiriyah, namely (the Iraqi Trade Bank, the Gulf Commercial Bank, the Bank of Baghdad, the Union Bank of Iraq), which represented The stu
... Show MoreAbstract
This paper discusses the essence of the developmental process in auditing firms and offices at the world today. This process is focused on how to adopt the audit concepts which is based on Information and Communication Technology (ICT), including the Continuous Auditing (CA) in particular. The purpose of this paper is to design a practical model for the adoption of CA and its requirements according to the Technology Acceptance Model (TAM). This model will serve as a road map for manage the change and development in the Iraqi auditing firms and offices. The paper uses the analytical approach in reaching to the target results. We design the logical and systematic relations between the nine variable
... Show MoreAbstract
The problem of the study is the main question (Can tourism planning address the phenomenon of unemployment in Iraq ?) , And the importance of the study in the fact that the tourism sector can become an effective development alternative in many countries, especially Iraq, as tourism contributes to diversify sources of income and stimulate other economic sectors , We know how important Iraq's qualifications are in the field of tourism and what it can generate on the public treasury, To confirm the current study on the need to pay attention to tourism planning for its role in providing employment opportunities that reduce the unemployment rate in the future.
&n
... Show Moreيتناول هذا البحث دراسة واحدة من المفاهيم المهمة الوافدة الى المجتمع الاسلامي، بعد أن تطور في بيئة غربية وتبنته حركة نسوية متطرفة، تدعو الى مركزية الأنثى والعداء للرجل والأسرة النمطية، إنتقل هذا المصطلح الى المجتمع الإسلامي بعد أن تبنته أجندة عالمية تحاول وباستمرار طمس معالم الفطرة الإنسانية وتغير هوية الشعوب.
Activity test of the inhibitors purified from barley and broad beans crop proved the inhibition activity against 6 types of rots Pencillium ssp and Aspergellusflavus and Aspergillus niger and Fusarium solani and Fusarium semitectum and Mucor with three concentrations 0.1 and 0.2 and 0.3 mg/ml, where the inhibitor purified from the second peak of broad beans proved that it had a higher inhibition activity against the growth of test rots which were 53.75 and 62.5 and 78.5 and 76.25 and 84 and 18.8% respectively, at 0.3 mg/ ml followed by the first peak of the inhibitor purified from broad beans the inhibition activity were 43.75 and 50 and 62.96 and 75 and 80 and 12.5 then the inhibitor purified from barley in which the inhibition activity
... Show MoreThe research discusses the problem of salaries in the public sector in terms of the process of analyzing its structure and the possibility of benefiting from the information provided by the analysis process for the strategic planning process, and the General Authority for Groundwater has been adopted and one of the formations of the Ministry of Water Resources, which is centrally funded, to represent the salary structure of its employees (1117) employees be a field of research, as the salary structure in it was analyzed for the period between (2014-2019) using the quantitative approach to analysis and by relying on a number of statistical tools in the analysis process, including mathematical circles, upper limits, lower limits, p
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More