Preferred Language
Articles
/
A4aOT4YBIXToZYALMIK7
Cloud Computing Adoption by Higher Education Institutions of Iraq: An Empirical Study
...Show More Authors

In the last years, a new technology called Cloud computing has been developed. Empirical and previous studies, commonly examined in business field and other domains. In this study, the significant factors that affecting the adoption of cloud computing have been examined using a frequency analysis that have been explored by the previous studies. The results showed that the most effected factors were relative advantage which followed by security and privacy, complexity, innovativeness, and external support. In this study the model of technology organization-environment was used to examine the significant factors that affecting the adoption of cloud computing.

Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Intellectual contents in realistic plastic artworks, paintings by Iranian artist Ayman Al-Maliki (An analytical study)
...Show More Authors

The study tagged ( the intellectual implications of the realistic Fine works of art) is a scientific effort to detect modest intellectual and artistic dimensions of the artwork realistic plastic , through some selected artistic productions of the painted work of art of the Iranian artist Ayman al - Maliki , with the result that the researcher collects materials to serve the scientific research topic which comes in three chapters.
First chapter included the general framework of the research (the promise of the research problem and its significance, objectives and limits and some of the terms contained therein).
Second chapter of this research was specified to the theoretical framework which included some of the topics that are dire

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
Spread of Private Education: An Analytical Geographical Study of the Factors of their Appearance, Prevalence and Functional Competence in Baghdad: سيناء عدنان عبد الله, و أريج بهجت أحمد
...Show More Authors

يهدف البحث إلى تقييم الكفاءة الوظيفية لمؤسسات التعليم الأهلي في أداء وظيفتها بمستوى عالٍ لتشبع حاجة سكان المدينة الذين فضّلوا التعليم الأهلي على التعليم داخل المؤسسات الحكومية مما أدى إلى انتشارها، وصولا إلى أهم الآثار المترتبة على ذلك الانتشار إذ نافست فيه مؤسسات التعليم الحكومي، بل وتنافست المؤسسات الأهلية فيما بينها لتقديم أفضل خدمة تعليمية للصراع من أجل البقاء، وتهدف أيضا إلى  إظهار الوجه السلبي ا

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Over application courier company (DHL) to keep the quality of service to achieve customer satisfaction the adoption of precedence delivery time - A prospective study))
...Show More Authors

Over application courier company (DHL) to keep the quality of service to achieve customer satisfaction the adoption of precedence delivery time - A prospective study))

Become attention to quality is a global phenomenon, and I took organizations and governments around the world attaches special attention, but we can say that quality has become the first function for many organizations, and has become a management philosophy

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The secondary vocational education and labor market requirements in Iraq (the period after 2003(
...Show More Authors

Vocational education has great importance to comprehensive national development as it provides intermediate cadres able of operating the factories and laboratories in the farms and fields beside the work in the fields of health, service, administration and commercial. Due to the importance of this type of education in society, it is necessary to do a qualitative reform of vocational education in order to make the educational staffs get the necessary basic expertise to adapt the requirements of the labor market and try to rearrange and organize the workforce through put long-term economic and social policy through certain planning open to the workforce. The workforces structure according to gradual expansion in all the national ec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
2018 11th International Conference On Developments In Esystems Engineering (dese)
Natural Rivers Longitudinal Dispersion Coefficient Simulation Using Hybrid Soft Computing Model
...Show More Authors

View Publication
Scopus (19)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jul 05 2017
Journal Name
Neural Computing And Applications
Hybrid soft computing approach for determining water quality indicator: Euphrates River
...Show More Authors

View Publication
Scopus (36)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Harold pinter and Iraq: An analysis of war(2003)
...Show More Authors

0

View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of Common Stocks Using The Fama-French Five Factor Model An Applied Study in The Iraq Stock Exchange
...Show More Authors

     The process of stocks evaluating considered as a one of challenges for the financial analysis, since the evaluating focuses on define the current value for the cash flows which the shareholders expected to have. Due to the importance of this subject, the current research aims to choose Fama & French five factors Model to evaluate the common stocks to define the Model accuracy in Fama& French for 2014. It has been used factors of volume, book value to market value, Profitability and investment, in addition to Beta coefficient which used in capital assets pricing Model as a scale for Fama & French five factors Model. The research sample included 11 banks listed in Iraq stock market which have me

... Show More
View Publication Preview PDF
Crossref