Perceived Trust of Stakeholders: Predicting the Use of COBIT 2019 to Reduce Information Asymmetry
This research aims at investigating pupils’ ability in using discourse markers which are identified in the English textbooks of secondary schools. Four texts are chosen from third intermediate class. The four texts are short stories of different topics.
This research hypothesizes that there are no statistical significant differences among Iraqi intermediate pupils’ ability in using textual
... Show MoreOne of the most significant elements influencing weather, climate, and the environment is vegetation cover. Normalized Difference Vegetation Index (NDVI) and Normalized Difference Built-up Index (NDBI) over the years 2019–2022 were estimated based on four Landsat 8 TIRS’s images covering Duhok City. Using the radiative transfer model, the city's land surface temperature (LST) during the next four years was calculated. The aim of this study is to compute the temperature at the land's surface (LST) from the years 2019-2022 and understand the link, between LST, NDVI, and NDBI and the capability for mapping by LANDSAT-8 TIRS's. The findings revealed that the NDBI and the NDVI had the strongest correlation with the
... Show MoreBackground: Osteoporosis is one of the major public health problems from which more and more people in the world are suffering. There is evidence suggesting that osteoporosis knowledge is one contributor to osteoporosis preventive behavior. Aim of the Study: To assess the knowledge regarding osteoporosis risk factors, prevention, and management in women of reproductive ages. To identify any association between knowledge and studied factors.
The aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreSoil wetted pattern from a subsurface drip plays great importance in the design of subsurface drip irrigation (SDI) system for delivering the required water directly to the roots of the plant. An equation to estimate the dimensions of the wetted area in soil are taking into account water uptake by roots is simulated numerically using HYDRUS (2D/3D) software. In this paper, three soil textures namely loamy sand, sandy loam, and loam soil were used with three different types of crops tomato, pepper, and cucumber, respectively, and different values of drip discharge, drip depth, and initial soil moisture content were proposed. The soil wetting patterns were obtained at every thirty minutes for a total time of irrigation equ
... Show More