Preferred Language
Articles
/
WRhK9pUBVTCNdQwC34CG
Evaluation of Knowledge Management System Requirements According to ISO 30401
...Show More Authors

This Paper assesses the knowledge management system (KMS) requirements at Al-Ameed University concerning ISO 30401:2022. Specifically, the research aims to ascertain the degree to which international standards have been complied with and gaps that have been identified. A case study was conducted using field observations, interviews, and checklists to assess the institution's compliance with the KMS framework. The level of implementation and documentation of knowledge management processes was assessed using a seven-point scale. The findings reveal that Al-Ameed University has severe gaps in knowledge creation, sharing, and support for knowledge management in terms of strategic leadership. While certain elements like availability of resources show high degrees of compliance, others like stakeholders need assessment and continuous improvement show weaknesses. The overall degree of compliance with the ISO 30401:2022 is 58.08%, having a gap of 41.92% to be bridged. This study shows there is an urgent need to improve knowledge-sharing systems, strengthen leadership engagement, and strategically align knowledge management with the university's mission and goals. Their findings could help those academic institutions that want to improve knowledge governance and align themselves with internationally accepted standards shaking hands to become the key players in innovation and operational efficiencies. Future research should investigate KMS gap closure methodologies in other advanced situations/dimensions in higher educational settings.

Crossref
View Publication
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
Wastewater Bio-solids Management for Fertilizer Quality Using Co- composting Process
...Show More Authors

Co-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a

... Show More
View Publication
Publication Date
Thu Oct 01 2020
Journal Name
Green Engineering
Sustainability and recovery project management implementation on construction projects in Iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
US strategy in conflict management: between hard power and soft power
...Show More Authors

تتحقق اهداف الدول عبر توظيف امكانياتها ومواردها ، وهذا التوظيف يقترن بوسائل مختلفة باختلاف الامكانيات المتاحة. وتتفاوت هذه الوسائل ما بين الاكراه والترغيب ، واحياناً من الممكن استخدام كلا الوسيلتين ، وتندرج هذه الوسائل من حيث تصنيفها ضمن نوعين رئيسين هما: القوة الصلبة ]القوة العسكرية والاقتصادية[ والقوة الناعمة ]استخدام جميع ادوات الترغيب وتسخيرها من اجل ان تُعجب بها الدول الاخرى وتنصاع

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (20)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Current Pharmaceutical Design
Dry Eye Disease: Present Challenges in the Management and Future Trends
...Show More Authors

View Publication
Scopus (43)
Crossref (45)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Energy management and storage systems on electric vehicles: A comprehensive review
...Show More Authors

View Publication
Scopus (58)
Crossref (50)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
International Scientific Congress Of Pure, Applied And Technological Sciences (minar Congress)
Evaluation Of Electromagnetic Pollution Of Cellular Mobile Network
...Show More Authors

Wireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in

... Show More
Publication Date
Wed Dec 13 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Educational Program on Nurses' Knowledge Toward Early Prediction of Acquired Weakness in The Intensive Care Unit.
...Show More Authors

Abstract:

Objectives: The present study aims to evaluate effectiveness of educational program the nurses' knowledge towards early prediction of acquired weakness in the intensive care unit.

Methodology: A pre-experimental study design (comparison of two groups), which was achieved through the pre and post-test method for the study sample through the application of an educational program in the intensive care unit of Al-Zahra Teaching Hospital in Kut city, Wasit Governorate. The study was conducted for the period from 28th April 2022 to 15th August 2022 by selecting a purposive (non-probability) sample for this study. The study sample size was (52) nu

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The added value of the knowledge assets using a scale (VAIC) in a sample of the industrial sector companies
...Show More Authors

The sustainable competitive advantage for organizations is one of the requirements for value creation, which centered on the possession of scarce resources that achieve maximum flows to invest in intellectual capital, if what has been interest in them, measured and employed the way properly and style, so I figured the need for new technologies to enable organizations to measure the intellectual and physical assets and to assess its performance accordingly, so it sheds search light on the measurement of the added value of existing knowledge using the standard value-added factor is the intellectual (value added intellectual coefficient) (VAIC) and to develop a set of assumptions about the extent of the difference between the sample

... Show More
View Publication Preview PDF
Crossref