Preferred Language
Articles
/
WRhK9pUBVTCNdQwC34CG
Evaluation of Knowledge Management System Requirements According to ISO 30401
...Show More Authors

This Paper assesses the knowledge management system (KMS) requirements at Al-Ameed University concerning ISO 30401:2022. Specifically, the research aims to ascertain the degree to which international standards have been complied with and gaps that have been identified. A case study was conducted using field observations, interviews, and checklists to assess the institution's compliance with the KMS framework. The level of implementation and documentation of knowledge management processes was assessed using a seven-point scale. The findings reveal that Al-Ameed University has severe gaps in knowledge creation, sharing, and support for knowledge management in terms of strategic leadership. While certain elements like availability of resources show high degrees of compliance, others like stakeholders need assessment and continuous improvement show weaknesses. The overall degree of compliance with the ISO 30401:2022 is 58.08%, having a gap of 41.92% to be bridged. This study shows there is an urgent need to improve knowledge-sharing systems, strengthen leadership engagement, and strategically align knowledge management with the university's mission and goals. Their findings could help those academic institutions that want to improve knowledge governance and align themselves with internationally accepted standards shaking hands to become the key players in innovation and operational efficiencies. Future research should investigate KMS gap closure methodologies in other advanced situations/dimensions in higher educational settings.

Crossref
View Publication
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Al-kindy College Medical Journal
A Population-Based Study on Agreement between Actual and Perceived Body Image
...Show More Authors

Background: Obesity tends to appear in modern societies and constitutes a significant public health problem with an increased risk of cardiovascular diseases.

Objective: This study aims to determine the agreement between actual and perceived body image in the general population.

Methods: A descriptive cross-sectional study design was conducted with a sample size of 300. The data were collected from eight major populated areas of Northern district of Karachi Sindh with a period of six months (10th January 2020 to 21st June 2020). The Figure rating questionnaire scale (FRS) was applied to collect the demographic data and perception about body weight. Body mass index (BMI) used for ass

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Some Game via Ἷ-Semi-g-Separation Axioms
...Show More Authors

The research demonstrates new species of the games by applying separation axioms via  sets, where the relationships between the various species that were specified and the strategy of winning and losing to any one of the players, and their relationship with the concepts of separation axioms via  sets have been studied.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Feb 22 2026
Journal Name
Al–bahith Al–a'alami
Cultural and educational values for children
...Show More Authors

Programs directed to children through the media in general and in television in particular are among the main factors that help in forming the cultural and educational values of this important segment of society, and in light of this the study problem was identified in answering a major question: What are the cultural and educational values that Ajyal channel seeks Space planted in children through my program, Iftah Ya Simsim (in its new season) and Friends of Ajyal? , While the objectives of the study were evident in identifying the most prominent cultural and educational values that the Ajyal satellite channel worked to instill in children, and identifying the nature of the techniques used by Ajyal channel in providing the value conten

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Tasnim International Journal For Human, Social And Legal Sciences
Patriarchy, and Colonialism in Ama Ata Aidoo's Anowa : A Feminist Approach
...Show More Authors

Abstract The research investigates in detail the fascinating story of its title character, which may work as an allegory for Africa itself in its past. Ama Ata Aidoo is miscellaneous writers who wrote in different literary genre like drama , short stories novel and , poetry and criticism . She is also an active feminist. Aidoo is against the colonial practice and its influence on African minds. Aidoo's play Anowa confronts painful issues in Africa's past, mostly those of the slave trade. She goes further to tackle issues of patriarchal domination and African feminism, like the relationships between individuals and society, women and motherhood, men and women, husbands and wives, mothers and daughters, and above all the future invasion

... Show More
Publication Date
Mon Oct 10 2016
Journal Name
Iraqi Journal Of Science
Satellite image classification using KL-transformation and modified vector quantization
...Show More Authors

In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
The Iraqi Journal For Information And Documentation Studies
Smart Libraries and Their Applications in The Arab World
...Show More Authors

The main aim of conducting this research is to identify the applications of Smart libraries in the Arab world. The Researcher relied on the documentary and Survey approach to collect information and data through the Internet, and to get to know these libraries. Then the Research came in three sections dealing with the first topic: The general framework of the study. The second topic deals with: introducing Smart libraries and indicating their types and characteristics. The Third topic dealt with the requirements of Smart libraries'application by identifying the basic components of it (Smart building, Smart Librarian , Smart devices, systems and software, Smart information sources,and Smart beneficiaries), and dealt with Smart libraries appl

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Family violence, its causes and effects on society (women and children)
...Show More Authors

Summary of the research Family violence, its causes and effects on society (women and children). Search Goal: The current research aims to identify: 1. Causes of family and social violence (for children and women). 2. How to process. research importance : Domestic violence is a major and devastating problem that has a negative and direct impact on children in particular and women or mothers in general. The problem of domestic violence is linked to many factors and individual, social, economic, psychological and environmental variables, which makes one theory that claims to be inaccurate. It is difficult to understand the nature of family violence without linking it to some of the concepts related to it. The negative effects that may lead

... Show More
View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Nouns and attributes And what the Kalamayons termed it
...Show More Authors

Many people, especially among the youth or scholars, wonder about the position of Islam or the scholars of faith on the terminology used by scholars of theology in a certain period of time, and then circulated by people throughout the times and to the present day, such as the terms (the old, the maker, the updated, the cause and the cause) and so on, and this What I felt myself while teaching this subject from some of the students, some of whom consider it blasphemy, and some of them consider it an innovation of speech, and so there were many questions about this subject, which led me to write and research it, after relying on God Almighty, although the research is not long due to the nature of This topic on the one hand, and because I d

... Show More
View Publication Preview PDF