Preferred Language
Articles
/
A4aOT4YBIXToZYALMIK7
Cloud Computing Adoption by Higher Education Institutions of Iraq: An Empirical Study
...Show More Authors

In the last years, a new technology called Cloud computing has been developed. Empirical and previous studies, commonly examined in business field and other domains. In this study, the significant factors that affecting the adoption of cloud computing have been examined using a frequency analysis that have been explored by the previous studies. The results showed that the most effected factors were relative advantage which followed by security and privacy, complexity, innovativeness, and external support. In this study the model of technology organization-environment was used to examine the significant factors that affecting the adoption of cloud computing.

Publication Date
Mon Jun 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
MORPHOLOGICAL, ANATOMICAL AND CHEMICAL STUDY OF AN EXOTIC PLANT JATROPHA INTEGERRIMA JACQ. 1763 (EUPHORBIACEAE) IN IRAQ
...Show More Authors

Jatropha L. is an exotic genus to Iraq and it has been cultivated in gardens for ornamental purposes because of the shiny red color of the flowers. The plant adapted to environmental conditions and succeeded in growing and blooming, which is why the species was interested to study. The species Jatropha integerrima Jacq. was examined and diagnosed for the first time in Iraq. Morphological and anatomical characteristics for leaves (considering that the variations are the most reliable and taxonomically important) were provided. The Phytochemical screening showed the presence of alkaloids, flavonoids, terpenes, tannins and saponins. The qualitative analysis by TLC indicated the presence of alkaloids and flavonoid that was detected by specia

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
An Environmental Study of Epiphytic Algae on Ceratophyllum demersum in Tigris River within Baghdad City, Iraq
...Show More Authors

The present study was conducted in the Tigris River within Baghdad (University of Baghdad campus). The study included some physicochemical parameters and qualitative of epiphytic algae on the host plant (Ceratophyllum demersum) during summer season 2013. The results revealed that the study area was alkaline, hard and oxygenated water. A total of 105 taxa of epiphytic algae was identified. Bacillariophyceae diatoms composed 44.7% of the total and were represented by 42.4% of the order Pennales and 1.9 %of the order Centrales. Chlorophyceae composed 32.3%, followed by Cyanophyceae composed 22.8 % of the total. The total number of epiphytic algae was fluctuated among the study period. Most of the identified algae were benthos type and a few

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Webology
Ethical Perception of Leadership and Responsible Behavior: An Exploratory Study of Leaders of Public Organizations in Iraq
...Show More Authors

The study aimed to identify the effect of the ethical perception of a sample of managers in public organizations on responsible behavior in light of the rapid changes taking place in the external environment. To achieve this, the researcher followed the descriptive analytical approach by applying a questionnaire of two parts. The first part dealt with the ethical perception according to the scale of Johnson (2015), which consisted of (22) items. The second part dealt with measuring responsible behavior, which consisted of (20) items based on the scale of Development of Ethical Behavior (Narvaez, 2006) for a sample of (125) respondents randomly chosen. The results showed that the estimation degree of managers in public governmental o

... Show More
View Publication
Crossref
Publication Date
Tue Nov 06 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
The Impact of An Education Program upon Women's Knowledge in Managing Breast Self–Examination
...Show More Authors

Objective: To find out if there are any significant differences between these women's knowledge in the
management of Breast Self-Examination in study and control group regarding some variables.
Methodology: A quasi-experimental design was used. A purposive "non-probability" sample of (260) women who
are employee and students in both colleges (Nursing and Health and Medical Technologies) was selected. The
sample consists of two groups, experimental group (130) includes those in (Nursing college), and control group
(130) in (Health and Medical Technologies). A questionnaire was constructed which included demographic
information, reproductive information, family history, previous medical history, and information about wome

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The educational means used by teachers of art education in primary schools
...Show More Authors

      Education varies in terms of form and content between verbal and abstract education through the delivery of knowledge and enriching experiences through verbal communication and ephemeral learning and based on sensory experiences that provide visual and audio visualizations that make it imperative to install and retain knowledge and experience. It is obvious that meanings And the concepts grow the more tangible sensory experiences that make the process of communication highly efficient, and the more the learner's acquisition of direct sensory experiences, ie the first source is the life situations and normal circumstances of the process of communication, but if these can not be available It is necessary to a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The effects of human error in the banking risks - Empirical study in a number of Iraqi private banks
...Show More Authors

Abstract

This research aims to study human error effects in the banking risks in the private banks  through the measurement and testing of human error effect in every kind of banking risks types and stand on the most closely associated with the risks in order to focus on them and make appropriate processors have with respect to and increase the availability of skills and expertise required to carry out banking operations of error-free manner.

Find dealt with human error in terms of meaning and understandable, classifications and types, causes and consequences and its approaches and theories. Also addressed placed banking risks in terms of meaning and concept, species and entr

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 06 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Blended Learning in Nursing Education at the Middle Region in Iraq
...Show More Authors

Abstract

Objective(s): To evaluate blended learning in nursing education at the Middle Region in Iraq.

Methodology: A descriptive study, using evaluation approach, is conducted to evaluate blended learning in nursing education in Middle Region in Iraq from September 26th, 2021 to March 22nd, 2022. The study is carried out at two Colleges of Nursing at the University of Baghdad and University of Tikrit in Iraq. A convenient, non-probability, sample of (60) undergraduate nursing students is selected. The sample is comprised of (30) student from each college of nursing, Self-report questionnaire is constructed from the literature, for e

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref