الغرض - تعتمد هذه الدراسة على المنهج الوصفي التحليلي من خلال جمع البيانات اللازمة وتحليلها، كون هذا المنهج يركز على استطلاع الآراء لعينة البحث وتوجهاتها ، وتهدف إلى تطوير نموذج يدرس العلاقة بين خلق المعرفة والبراعة التنظيمية في المصارف الخاصة العراقية والتحقق من صحته تجريبياً. التصميم / المنهجية / المدخل- تم إجراء مسح عبر استمارة استبيان لجمع البيانات من عينة من (113) مدير من مصارف تجارية خاصة بالإضافة إلى ذلك استخدمت هذه الدراسة برنامج AMOS و حزمة البرنامج الإِحصائي الجاهز ( SPSS V.25 ) لاختبار الفرضيات المقترحة للنموذج النظري تجريبياً. النتائج - تظهر النتائج أن خلق المعرفة لها تأثير كبير وإيجابي غير مباشر على تحفيز البراعة التنظيمية في المصارف التجارية الخاصة من خلال تأثيرها على استغلال الفرص في مكان العمل واستكشاف الفرص في البيئة الخارجية للمصارف .الآثار العملية - لتحسين خلق المعرفة يجب على ادارة المصارف ضرورة ايلاء اهتمام اكثر بها بوصفها موردا ستراتيجيا لخلق الثروة والقيمة المضافة لتتمكن المنظمات من النمو والبقاء من خلال الدورات التدريبية وحملة الشهادات العليا واستقطاب الخبرات المعرفية علاوة على ذلك ضرورة تعظيم الوعي الثقافي نحو تحسين البراعة التنظيمية للمصارف لاسيما في استغلال الفرص الداخلية للمصرف من امكانات مادية وبشرية في ضوء الظروف الراهنة من خلال المكافآت والحوافز المعنوية والمادية .الأصالة / القيمة - هذه الدراسة تكمل وتقدم الأبحاث السابقة حول خلق المعرفة بعدة طرق أولاً تقترح الدراسة الحالية نموذجًا مفاهيميًا يوضح العلاقات المتبادلة بين المتغيرات الرئيسية في المصارف الخاصة العراقية ثانيًا تستكشف هذه الدراسة دور البراعة التنظيمية والتي تستفيد من استغلال واستكشاف الفرص في سياق اكتساب المعرفة وتراكمها وتبادلها ، وبالتالي التغلب على التحديات المرتبطة بخلق المعرفة
KE Sharquie, AA Noaimi, WK Al-Janabi, Journal of Cosmetics, Dermatological Sciences and Applications, 2013
Abstract: Residual ridge resorption is chronic, progressive, irreversible and cumulative condition associated with teeth loss. Management of a residual ridge with severe resorption to fulfill the patient’s esthetic and functional requirements is quite difficult for the practitioner and also in the construction of an acceptable appliance. As the height of the edentulous ridge reduces the mandibular denture will be improperly function. Severe resorption of the mandibular alveolar ridge may cause instability and discomfort of the convention acrylic resin denture. Dealing with this condition requires clinical skills and knowledge. Treating the severely resorbed mandibular ridge is a challenging effort for prosthodontics. This research present
... Show MoreThere is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i
... Show MoreCNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MorePurpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad. Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements. Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show More