Preferred Language
Articles
/
1xdM_I0BVTCNdQwCyyu4
The effect of creating knowledge according to the model (Nonaka & Takeuchi, 1995) on organizational ambidexterity: A study on a sample of Iraqi private banks
...Show More Authors

الغرض - تعتمد هذه الدراسة على المنهج الوصفي التحليلي من خلال جمع البيانات اللازمة وتحليلها، كون هذا المنهج يركز على استطلاع الآراء لعينة البحث وتوجهاتها ، وتهدف إلى تطوير نموذج يدرس العلاقة بين خلق المعرفة والبراعة التنظيمية في المصارف الخاصة العراقية والتحقق من صحته تجريبياً. التصميم / المنهجية / المدخل- تم إجراء مسح عبر استمارة استبيان لجمع البيانات من عينة من (113) مدير من مصارف تجارية خاصة بالإضافة إلى ذلك استخدمت هذه الدراسة برنامج AMOS و حزمة البرنامج الإِحصائي الجاهز ( SPSS V.25 ) لاختبار الفرضيات المقترحة للنموذج النظري تجريبياً. النتائج - تظهر النتائج أن خلق المعرفة لها تأثير كبير وإيجابي غير مباشر على تحفيز البراعة التنظيمية في المصارف التجارية الخاصة من خلال تأثيرها على استغلال الفرص في مكان العمل واستكشاف الفرص في البيئة الخارجية للمصارف .الآثار العملية - لتحسين خلق المعرفة يجب على ادارة المصارف ضرورة ايلاء اهتمام اكثر بها بوصفها موردا ستراتيجيا لخلق الثروة والقيمة المضافة لتتمكن المنظمات من النمو والبقاء من خلال الدورات التدريبية وحملة الشهادات العليا واستقطاب الخبرات المعرفية علاوة على ذلك ضرورة تعظيم الوعي الثقافي نحو تحسين البراعة التنظيمية للمصارف لاسيما في استغلال الفرص الداخلية للمصرف من امكانات مادية وبشرية في ضوء الظروف الراهنة من خلال المكافآت والحوافز المعنوية والمادية .الأصالة / القيمة - هذه الدراسة تكمل وتقدم الأبحاث السابقة حول خلق المعرفة بعدة طرق أولاً تقترح الدراسة الحالية نموذجًا مفاهيميًا يوضح العلاقات المتبادلة بين المتغيرات الرئيسية في المصارف الخاصة العراقية ثانيًا تستكشف هذه الدراسة دور البراعة التنظيمية والتي تستفيد من استغلال واستكشاف الفرص في سياق اكتساب المعرفة وتراكمها وتبادلها ، وبالتالي التغلب على التحديات المرتبطة بخلق المعرفة

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Podophyllin (10%) Ointment: A New Therapeutic Modality for Psoriasis
...Show More Authors

KE Sharquie, AA Noaimi, WK Al-Janabi, Journal of Cosmetics, Dermatological Sciences and Applications, 2013

View Publication
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Science And Research
How Do You Treat a Severely Resorbed Mandibular Ridge?
...Show More Authors

Abstract: Residual ridge resorption is chronic, progressive, irreversible and cumulative condition associated with teeth loss. Management of a residual ridge with severe resorption to fulfill the patient’s esthetic and functional requirements is quite difficult for the practitioner and also in the construction of an acceptable appliance. As the height of the edentulous ridge reduces the mandibular denture will be improperly function. Severe resorption of the mandibular alveolar ridge may cause instability and discomfort of the convention acrylic resin denture. Dealing with this condition requires clinical skills and knowledge. Treating the severely resorbed mandibular ridge is a challenging effort for prosthodontics. This research present

... Show More
Preview PDF
Publication Date
Sat Jul 01 2017
Journal Name
Journal Of King Saud University - Science
A semi-analytical iterative technique for solving chemistry problems
...Show More Authors

View Publication
Crossref (17)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Water Treatment With Conventional and Alternative Coagulants: A Review
...Show More Authors

There is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
International Journal Of Artificial Intelligence And Mechatronics
Building a Three-Axis CNC Milling Machine Control System
...Show More Authors

CNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Artificial Intelligence Techniques for Colon Cancer Detection: A Review
...Show More Authors

Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Thu Aug 17 2023
Journal Name
Revista De Gestão Social E Ambiental
Complete Street as a Key for Urban Environment Development
...Show More Authors

Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad.   Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements.   Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref