Information and communication technology has a significant influence on employee procedures. Businesses are investing in e-CRM technologies, yet it is difficult to assess the performance of their e-CRM platforms. The DeLone and McLean Information Systems Success framework can be modified to the current e-CRM assessment difficulties. The new framework's different aspects provide a concise framework for organizing the e-CRM key metrics identified in this study. The purpose of this study is to apply and verify that the Updated DeLone and McLean IS Model can be employed to explain e-CRM adoption among employees, along with the extended Updated DeLone and McLean Model with its five output factors, namely system quality, service quality, information quality, ease of use employee satisfaction. For this study, data was collected from 300 employees working on e-CRM and the data were analyzed using PLS-SEM. The experimental framework has a significant effect and shows that most of the hypotheses of the study are supported. Moreover, the framework contributes to the area of the success of e-CRM and individual performance.
This research deals with the fact that arts exit from their familiar context in practice and enter in the context of the fantasy and exoticism picture. In order to understand the theatrical phenomenon and know the way of its production of the fantasy picture, especially the acting performance in its transitions between the real and fantasy. This study consists of: an introduction of the research in which the researcher presented the research problem, importance and objectives.
The theoretical framework dealt with founding a theoretical part for the research consisting of two sections: the first (fantasy: the concept and the working) and the second (techniques of acting perfo
... Show MoreThe latest events in Iraq and notably the fall of Mosul in the summer of 2014 have marked a turning point in The modern history of Iraq. Violent terrorist groups have overrun a vast area comprising of many towns in mid and northern Iraq causing many casualties and mass migration. Despite Iraq’s long history of pain and suffering the events of the second half of the year 2014 have been the most violent ever witnessed. From this point of view the researcher has tried to identify specifically in this time and place the effect these events have had on the Iraqi artist and to understand how the Iraqi artists depicted this violence in their works of art. The research comprises four parts; the first looked at the language used and the and pro
... Show MoreTransient three-dimensional natural convection heat transfer due to the influences of heating from one side of an enclosure filled with a saturated porous media, whereas the opposite side is maintained at a constant cold temperature, and the other four sides are adiabatic, were investigated in the present work experimentally. Silica sand was used as a porous media saturated with distilled water filled in a cubic enclosure heated from the side,using six electrical controlled heaters, at constant temperatures of (60, 70, 80, 90, and 100oC). The inverse side cooled at a constant temperature of (24oC) using an aluminum heat exchanger, consisted of 15 channels feeded with constant temperature water. Eighty thermocouples were used to control t
... Show MoreThis study was aimed to investigate the response surface methodology (RSM) to evaluate the effects of various experimental conditions on the removal of levofloxacin (LVX) from the aqueous solution by means of electrocoagulation (EC) technique with stainless steel electrodes. The EC process was achieved successfully with the efficiency of LVX removal of 90%. The results obtained from the regression analysis, showed that the data of experiential are better fitted to the polynomial model of second-order with the predicted correlation coefficient (pred. R2) of 0.723, adjusted correlation coefficient (Adj. R2) of 0.907 and correlation coefficient values (R2) of 0.952. This shows that the predicted models and experimental values are in go
... Show MoreOsmotin and osmotin-like proteins belong to the PR-5 pathogenesis-related group of proteins and are induced in response to various types of biotic and abiotic stresses in several plant species. Carrot was transformed with a tobacco osmotin gene that encodes a protein lacking the vacuolar-sorting motif that is composed of a 20-amino-acid sequence at the C-terminal end, under the control of the cauliflower mosaic virus 35S promoter, using Agrobacterium-mediated transformation. Transgene integration and expression were confirmed by Southern and western blot analyses, and three selected transgenic lines were evaluated for their ability to tolerate drought stress. Under drought stress conditions, all transformants exhibited slower rates of wilti
... Show MoreBackground: The repair of bone defects remains a major clinical orthopaedic challenge. Bone is a highly vascularised tissue reliant on the close spatial and temporal connection between blood vessels and bone cells to maintain skeletal integrity. This study aimed to study the efficacy of Panax ginseng as a osteoinducer in tibia of rat and as a stimulator for bone healing and to study the immunohistochemical expression of osteonectin as bone formation markers in experimental and control groups during bone healing. Material and method: : In this study thirty albino male rats , weighting (200-300) gram ,aged (2-3) months ,will be used under control conditions of temperature ,drinking and food consumption. The animals will subject for an
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More