Preferred Language
Articles
/
jperc-418
Standards and quality controls for information technology applications to serve the Holy Quran
...Show More Authors

the research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.

To achieve this goal, the researcher has built a list of criteria according to the following steps:

First - identify the key areas covered by the whole list which are:

1 – Standards of system building and implementing with the operating screens.

2 – Standards of display forms including audio and video presentation.

3 – Standards which are related to the program philosophy.

4 - Standards which are related to the program objectives.

5 - Standards which are related to the program content.

6 - Standards which are related to sources and learning strategies.
7 - Standards which are related to the program educational activities.

8 - Standards which are associated with the amending and immediate feedback.
9 - Standards which are associated to the learners.
10 - Standards which are related to the methods of interaction between the learner and the program.

11 - Standards which are related to technical aspects.

12 - Standards which are related to the administrative aspects of the production.

Secondly - the formulating of items: The researcher formulated items standard according to the areas they represent, and organized them in the form of a closed questionnaire which were in their first form like (17, 22, 18, 27, 33, 12, 15, 21, 23, 14, 19, 11) items. There items were arranged respectively according to their areas to become (232).

       And the resolution was presented to a group of educational arbitrators and specialists in technology, curriculum, teaching methods, educational technology, measurement and evaluation in Iraqi universities to determine the validity of each item and its suitability according its area. The researcher used three choices for each item (appropriate, inappropriate, need to be modified), and asked them to propose other additional items if it is required. The researcher has shown the experts that the arbitration process will be achieved according to the Delphi method of all three rounds to reach the highest level of scientific accuracy.

           The resolution has been processed by calculating the weighted average of each item in addition to the weight percentile according to the Fisher equation. All the items have an average above the value and a high weighted percentage in general. The items were re-ordered depending on the strength of each item and the value of Centennial weight. The expert mentioned observations and suggestions to amending item(s) or dissociate some of the items into two items. In addition to integrate some other items and delete others bringing the number of items to (210).

             Then the researcher transfer list of criteria to card calendar specific measured each item weight listed on the ladder graded four (excellent, very good, good, poor) were given weights following (0, 1, 2, 3) to evaluate the quality control standards for IT applications programmed To serve the Holy Quran.

The researcher codified items card in order to make sure its Validity to the attention of a number of arbitrators specialists in the field of technology and curriculum and teaching methods and educational technology and measurement and evaluation to express their point of view about the clarity of each item and whether they are true in the measure placed for him, has expressed Important Notes and the value of satisfied researcher by and conducted against which the necessary adjustments, bringing the number of items observation card (204) item have been calculated researcher Reliability of the card across individuals using the method of Cooper to calculate the coefficient of agreement between the observers and that counts the number of times the agreement and the number of times the difference between the observers, it is clear that all transactions fortitude to analyze researcher with the observed first , The researcher observed with the second, and first observed with the second Notably, a high rank as follows (84.8%, 86.9%, 89.7%), and this means that the analysis tool was a high level of consistency, which gives an indication of the possibility of using the tool.

       The researcher has developed some recommendations and a number of proposals to complement the current study.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Use of Internet by Universities Teachers and Benefits in Teaching and Scientific Research
...Show More Authors

The research aims to shed light on the internet and how to employ them and to take advantage of applications in scientific research among faculty members, from a survey the opinions of professors at the University of Alanbar and Almustansiriah, to see the reality of use of the Internet and ways to invest in the service of scientific research.
The follow descriptive analysis approach , which is appropriate to the nature of this study concerned with exploring the views on the uses of the Internet. The study reached the field the following results:
1- There are(60) % of respondents use the Internet on an ongoing basis to see new information and keep pace with scientific developments in the field of specialty and the average use of the

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 31 2017
Journal Name
Journal Of Engineering
Development of an On-Line Self-Tuning FPGA-PID-PWM Control Algorithm Design for DC-DC Buck Converter in Mobile Applications
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Stances on the damage to manuscripts and ways to address them
...Show More Authors

Humans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.

View Publication Preview PDF
Publication Date
Thu Oct 09 2025
Journal Name
Journal Of Administration And Economics
Emotional intelligence and its relationship to leadership style Althoilahdrash field in the General Company for Cotton Industries
...Show More Authors

View Publication
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Calibration and Verification of the Hydraulic Model for Blue Nile River from Roseires Dam to Khartoum City
...Show More Authors

This research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing i

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Calibration and verification of the hydraulic model for Blue Nile river from Roseires dam to Khartoum city
...Show More Authors

This research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing it with anothe

... Show More
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using game theory models to determine the profit maximization policies for PepsiCo and Coca Cola in Baghdad
...Show More Authors

(Use of models of game theory in determining the policies to maximize profits for the Pepsi Cola and Coca-Cola in the province of Baghdad)

Due to the importance of the theory of games especially theories of oligopoly in the study of the reality of competition among companies or governments and others the researcher linked theories of oligopoly to Econometrics to include all the policies used by companies after these theories were based on price and quantity only the researcher applied these theories to data taken from Pepsi Cola and Coca-Cola In Baghdad Steps of the solution where stated for the models proposed and solutions where found to be balance points is for the two companies according to the princi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 09 2025
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte, Issn 1886-8576, Vol. 17, Nº. 4, 2022, Págs. 183-190
Psychological Empowerment and its Relationship to Organizational Citizenship Behavior for Workers in the Olympic Committee Sports Federations
...Show More Authors

Autorías: Suhair Meteab Munaf, Ali Abdulateef Ali, Mohannad Salman Dawood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 4, 2022. Artículo de Revista en Dialnet.

View Publication
Scopus
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
The propaganda content of the elements of expression in the face of the promotion of terrorist thought: (Military information of the popular crowd model)
...Show More Authors

The propaganda war is one of the most dangerous weapons used in various conditions of war and peace within any intellectual, political or military conflict to be targeted by multiple social groups and their effects on the intellectuals to change the viewpoints at the local and global level, including the use of technical treatment of the audio and visual medium, The impact of the psychological dimensions of the arms in the confrontation and spread terror in the ranks of the enemies and in the forefront of what Iraq faces in its battle against the And the use of it as a propaganda content contributes to the development of the spirit of tranquility and tranquility in the hearts of Iraqis and the return of the right to the owners “th

... Show More
View Publication Preview PDF
Crossref