Preferred Language
Articles
/
fxj3pJgBVTCNdQwC4sDC
The Role of the European Economic Security Strategy in Managing Economic Risks
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Thu May 12 2016
Journal Name
Biochemistry
Probing the Role of Active Site Water in the Sesquiterpene Cyclization Reaction Catalyzed by Aristolochene Synthase
...Show More Authors

View Publication
Crossref (28)
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A proposed model for disclosing the role of the collective intelligence system in improving joint auditing
...Show More Authors

This research aims to present a proposed model for disclosure and documentation when performing the audit according to the joint audit method by using the questions and principles of the collective intelligence system, which leads to improving and enhancing the efficiency of the joint audit, and thus enhancing the confidence of the parties concerned in the outputs of the audit process. As the research problem can be formulated through the following question: “Does the proposed model for disclosure of the role of the collective intelligence system contribute to improving joint auditing?”   

The proposed model is designed for the disclosure of joint auditing and the role

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The role credit guarantee companies to bank guarantee in the financing of small and medium enterprises
...Show More Authors

       It has become clear to see the role of the small and medium enterprises in the economy, and for the continuity of these projects it is necessary to supply finance from the banks, How ever the latter suffers risk of lending.                                                                          

 &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The role of financial reporting for non-current assets impairment in enhancing the relevance accounting information
...Show More Authors

  This research deals with the financial reporting for the non-current assets impairment from the viewpoint of international accounting standards, especially IAS 36 "Impairment of assets”. The research problem focused on the non-compliance with the requirements of IAS 36 which would negatively affect the accounting information quality, and its characteristics, especially the relevance of accounting information, that confirms the necessity of having such information for the three sub-characteristics in order to be useful for the decisions of users represented

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Shaqra University's Role in Building the Mental Image of the Kingdom's Vision 2030 among Its Students
...Show More Authors

The study problem is about the role of Shaqra University in building the mental image of the Kingdom’s 2030 vision among its female students. The study aims to examine the university’s role in providing information about the Kingdom’s 2030 vision, its role in shaping the vision’s image, the university’s role in the behavioral aspect of the vision, along with studying the extent of differences in answers of the sample individuals towards the study themes attributed to the personal variables. The researcher adopted the descriptive survey method. A sample of (1399) female students was used to achieve the study objectives. The results showed that university’s role in building the mental image of the Kingdom’s 2030 vision, among

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation the Role of Clinical Pharmacist on Prevents or Reduced the Medication Error in Emergency Department
...Show More Authors

Objective: To identify the role and importance of the clinical pharmacist in the Emergency Department on prevent
or reduced the medication error.
Methodology: We collected the medical file of 3400 patients, 1400 patient's file in (A) hospital, and 1000 patient's
file in each of (B and C) hospital, who admitted to the ED, at primary weekdays between 8 am to 2 pm, and
recorded all the intervention made by clinical pharmacist through an active search in clinical charts, with analysis
of the daily medical prescription. The potential severity of harm of the medication error judged by two reviewers,
a permanent emergency physician, and clinical pharmacist based on the National Coordinating Council (NCC) of
Medication Error

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
العلوم التربوية والنفسية
The effect of a strategy for creative thinking on the achievement of chemistry and the reading comprehension ability of secondary school female students
...Show More Authors

Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF