Preferred Language
Articles
/
joe-1966
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology
...Show More Authors

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain and the future of e-governance for connecting citizens and smart cities, such as Using Blockchain in the Notarial Office (NO), using blockchain technology in the management of police complaints, exploring blockchain-enabled end-to-end security e-voting, using blockchain and smart contract technology for trusted and safe property registration and record management, and using a blockchain-enabled Vehicle Certification (BVC) framework. Finally, this work has proven that the issue of transforming governments from the traditional system to electronic governments based on blockchain technology has become an inevitable matter of time.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 13 2022
Journal Name
Dental Hypotheses
Comparative Evaluation of Marginal Microleakage Between Bulk-Fill, Preheated Bulk-Fill, and Bulk-Fill Flowable Composite Resins Above and Below Cemento-Enamel Junction Using Micro-Computed Tomography: An In Vitro Study
...Show More Authors

Objective: The aim of this study was to compare the marginal microleakage between bulk-fill, preheated bulk-fill, and bulk-fill flowable composite resins above and below cemento-enamel junction (CEJ) using micro-computed tomography. Methods: Sixty freshly extracted premolar teeth were prepared with a slot shaped cavities of a total of 120 Class II: 3mm (bucco-lingual), 2mm (mesio-distal) with mesial-gingival margin located 1mm coronal to CEJ, and distal gingival margin located 1mm apical to the CEJ. The samples were randomly divided into two main groups according to the restorative material (Tetric EvoCeram and 3M Filtek), and each group was further sub-divided into three subgroups according to the consistency (bulk fill, preheated bulk fil

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Alexandria Engineering Journal
Employing Sisko non-Newtonian model to investigate the thermal behavior of blood flow in a stenosis artery: Effects of heat flux, different severities of stenosis, and different radii of the artery
...Show More Authors

View Publication
Scopus (28)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Sun Feb 15 2026
Journal Name
Al–bahith Al–a'alami
The agenda of the French news agency AFP in dealing with the press image of the peaceful resistance The Great Return Marches as a model "an analytical study" “A analytical study”
...Show More Authors

The study aimed to identify the treatment of the press image of the Great Return Marches in the French international news agency AFP by knowing the most important issues, their direction and the degree of interest in them. The study belongs to the descriptive research, and used the survey method, within the context of the content analysis method, and the researcher relied on the content analysis form tool and the interview tool to collect data. The study population is represented in the photos published by the French News Agency about the Great Return Marches during the period (end of March / 2018 until the end of November / 2019. The researcher chose an intentional sample using the Complete Census method. The study material represented

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Extent of Organizational Dynamic Capabilities' Contribution to Human Talent Management: An Analytical Study of the Opinions of a Sample of Administrative Leaders in the Presidency of the University of Mosul.
...Show More Authors

Actual and effective organizational dynamic capabilities in the work environment contribute to a number of factors that contribute to the organization's ability to manage its human talents. Thus, the study sought to identify the level of contribution of organizational dynamic capabilities to human talent management based on their dimensions in the investigated organization by determining the level of relationship and impact between these variables. The presidency of Mosul University was chosen as a field for the current study, and data were collected by adopting the questionnaire form as the main tool for the study. The study used a deliberate sample of (42)  administrative leaders in the investigated organization and adopte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
The mother of the believers, the mother of Salamah and her narrators of jurisprudence In attaining the goal of the rulings evidence Ibn Hajar al-Asqalani (d. 852 AH)      (prayer book)
...Show More Authors

The Muslim woman actively participated in narrating, preserving, controlling and maintaining the hadith, along with her brother, the man who later became an inexhaustible representative of the effort to preserve, control, and narrate the Sunnah. Undoubtedly, the mothers of the believers, may God be pleased with them, had a great advantage in communicating Islam and spreading the Sunnah of the Prophet Especially among women, all of them heard from him, may God’s prayers and peace be upon him, and lived with him in the details of his life on the disparity between them in memorizing and narrating and publishing them. It narrated (378) recently, and it is considered the second narrator after the mother of the believers Aisha, may God be pl

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Performance evaluation of policies and programs accordance with guide prepared by a dutch court of audit and the board of supreme audit (case study in wasit state company for textile industries)
...Show More Authors

Abstract\

preparation process of performance evaluation in organizations is of extreme importance, and under development in organizations and the opening of markets and technological developments in the industry and heightened competition among industrial organizations imposed systems are built for performance give a clear picture about performance and competition,  And centered research problem in answering the following questions: Is performance evaluation system is available in Wasit State Company for Textile Industries(Research sample ), This research aims to assess the performance of policies and programs in the company, according to guide performance evaluation of programs and policies prepared by the Dutch Cou

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Analisis de la metáfora en la poema " Noche oscura del alma" de San Juan de la Cruz Analysis metaphor in the poem "Dark Night of the Soul" John of the Cross
...Show More Authors

RESUMEN

 Una joven cuenta cómo, en plena noche, aprovechando la tranquilidad de esa hora, sale a escondidas de su casa y va a reunirse con su enamorado. Envuelta en la oscuridad, se deja dirigir por la luz de su propio amor hasta el lugar de la cita, donde la pasión de los amantes culmina. A continuación, relajados por la brisa nocturna, los amantes se adormecen, primero, el amado velado por la amada, por último, ella misma.

Amor entre dos enamorados. Unión mística de alma y Dios , aunque , de hecho , podría servirnos de clara exposición temática el subtitulo con que el poema suele publicarse en la tradición , tanto manuscrita como impresa : Canciones del alma que se goza d

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Psychological social conflict and its relation with family parental style for adolescences from the intermediate stage student at governmental Hail school, in the light of economical levels and sex variables .KSA
...Show More Authors

The current research attempts to examine the relationship between social-psychological conflict and their relation to family upbringing approaches among the adolescents of intermediate stage according to sex and economical level. To do this, the researcher prepared a questionnaire to measure social-psychological conflict that consisted of (32) item divided on four dimensions, and also she prepared a questionnaire to measure family upbringing approaches which composed of (28) item divided on four dimensions. The sample was (260) male and female student from intermediate stage chosen randomly. The results revealed that there were significant differences between social-psychological conflict which went to male, there was a negative correlat

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Topical 40% <i>Loranthus europaeus</i> Ointment as an Alternative Medicine in the Treatment of Acute Cutaneous Leishmaniasis versus Topical 25% Podophyllin Solution
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref