Preferred Language
Articles
/
fxj3pJgBVTCNdQwC4sDC
The Role of the European Economic Security Strategy in Managing Economic Risks
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The Role Of Information Technology In Enhancing Performance Evaluation And Responsibility Accounting (Empirical Study In Jordan Hotels )
...Show More Authors

   This paper suggesting a new modern method to evaluate the performance of hotel industry at Jordan instead of the classical method used by the industry and that is Bench Marking , this method can be done by comparing the performance of hotel industry at two serial years which helps in calculating a standard performance .

  The industry can use this standard to identify the variance, which make the evaluation of performance easier and support the efforts to develop the hotel industry at all levels and enable to give high quality services to customers.

    The study believed that this situation would not be achieved unless the hotel industry will app

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 28 2025
Journal Name
Retos
The effect of the beehive strategy on deliberate thinking and learning the setting skill of volleyball among female students at the College of Physical Education and Sports Sciences for Woman
...Show More Authors

Objective: Develop a deliberate thinking scale for the setting skill in volleyball for second-year female students in the College of Physical Education and Sports Sciences for Woman. Research methodology: The researchers used the experimental approach, employing a two-group approach (pre-test and post-test), to suit the nature of the research. The research community comprised (65) second-year female students from the College of Physical Education and Sports Sciences for Woman at the University of Baghdad for the academic year 2024-2025. The research sample was randomly selected, with (15) students in Section A, the experimental group, and (15) students in Section B, the control group. This group represented (46%) of the students. Th

... Show More
Preview PDF
Crossref
Publication Date
Mon Jul 28 2025
Journal Name
Retos
The effect of the beehive strategy on deliberate thinking and learning the setting skill of volleyball among female students at the College of Physical Education and Sports Sciences for Woman
...Show More Authors

Objective: Develop a deliberate thinking scale for the setting skill in volleyball for second-year female students in the College of Physical Education and Sports Sciences for Woman. Research methodology: The researchers used the experimental approach, employing a two-group approach (pre-test and post-test), to suit the nature of the research. The research community comprised (65) second-year female students from the College of Physical Education and Sports Sciences for Woman at the University of Baghdad for the academic year 2024-2025. The research sample was randomly selected, with (15) students in Section A, the experimental group, and (15) students in Section B, the control group. This group represented (46%) of the students. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 10 2025
Journal Name
Al-anbar University Journal Of Law And Political Sciences
Evaluation of the Geneva Conventions of 1949 and the role of the protecting power to implement its provisions
...Show More Authors

View Publication
Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Suggested Model for The Work of the Certified Fraud Examiner & His Role in Reducing The Incidents of Fraud and Corruption: An Applied Study in The Federal Board of Supreme Audit
...Show More Authors

Is hardly day expire without hearing the news either Abuse Managementthe accounting standards or the existence of serious misstatements by someauditors.Which caused the demanding of many companies in the recent republication of the financial statements and the re-announcement of its financialresults. Such acts raise questioning about the role that should be played by theauditors, prompting agencies responsible for setting auditing standards to takeTo throw increasingly responsibility on the auditors in order to interest risksfraud The Risks of Fraud in their review of the financial statements.also The Public Company Accounting Oversight Board in the U.S.called about the need of owning the Certified Public Accountants those whoaudits for

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Quality Function Deployment in Evaluating The Product Applied Research in General Company For Vegetable Oil Industry- Al-M'amoon Factory
...Show More Authors

The Quality  function deployment (QFD)  tool is an important  tool of total quality management because its a link between two important parts customer and production process of the product, using advanced House of quality, which contributed to provide more details about improving the product before it had a vision for the future of the product be improved. Also the identification of the two competitors (Alwazeer , Altouri) bases on the survey of retailers  which they identified five competitors products (Alwazeer , Altouri , Ferry , Jif , Dina)for the product (Zahi). Then House of quality  to product (Zahi) has been developed  By using a Kano Model  to classify of customer's requirements for the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
The Role of the Passive Conditioning in Achieving Thermal Comfort in Temporary Hotel Units: سماح محمد طالب الدويك-سامي أبوطالب-محمد صابر
...Show More Authors

This research is based on monitoring the local and environmental technologies in the design of the temporary hotel units (nomadic tents) in the desert in the south of Jordan in order to air condition them in summer and winter, maintaining the Jordanian identity, that they are presented with the form and technologies of the age in order to get to the universality.
The research adopted the descriptive analytical method and the researcher conducted the analysis of SWOT specified for the analysis of the positive and negative aspects in the design of the temporary hotel units and comparing them with the case studies available in the chosen research area "the Jordanian golden triangle", through the elements of the case under study. The res

... Show More
View Publication Preview PDF
Crossref