الغرض - تعتمد هذه الدراسة على المنهج الوصفي التحليلي من خلال جمع البيانات اللازمة وتحليلها، كون هذا المنهج يركز على استطلاع الآراء لعينة البحث وتوجهاتها ، وتهدف إلى تطوير نموذج يدرس العلاقة بين خلق المعرفة والبراعة التنظيمية في المصارف الخاصة العراقية والتحقق من صحته تجريبياً. التصميم / المنهجية / المدخل- تم إجراء مسح عبر استمارة استبيان لجمع البيانات من عينة من (113) مدير من مصارف تجارية خاصة بالإضافة إلى ذلك استخدمت هذه الدراسة برنامج AMOS و حزمة البرنامج الإِحصائي الجاهز ( SPSS V.25 ) لاختبار الفرضيات المقترحة للنموذج النظري تجريبياً. النتائج - تظهر النتائج أن خلق المعرفة لها تأثير كبير وإيجابي غير مباشر على تحفيز البراعة التنظيمية في المصارف التجارية الخاصة من خلال تأثيرها على استغلال الفرص في مكان العمل واستكشاف الفرص في البيئة الخارجية للمصارف .الآثار العملية - لتحسين خلق المعرفة يجب على ادارة المصارف ضرورة ايلاء اهتمام اكثر بها بوصفها موردا ستراتيجيا لخلق الثروة والقيمة المضافة لتتمكن المنظمات من النمو والبقاء من خلال الدورات التدريبية وحملة الشهادات العليا واستقطاب الخبرات المعرفية علاوة على ذلك ضرورة تعظيم الوعي الثقافي نحو تحسين البراعة التنظيمية للمصارف لاسيما في استغلال الفرص الداخلية للمصرف من امكانات مادية وبشرية في ضوء الظروف الراهنة من خلال المكافآت والحوافز المعنوية والمادية .الأصالة / القيمة - هذه الدراسة تكمل وتقدم الأبحاث السابقة حول خلق المعرفة بعدة طرق أولاً تقترح الدراسة الحالية نموذجًا مفاهيميًا يوضح العلاقات المتبادلة بين المتغيرات الرئيسية في المصارف الخاصة العراقية ثانيًا تستكشف هذه الدراسة دور البراعة التنظيمية والتي تستفيد من استغلال واستكشاف الفرص في سياق اكتساب المعرفة وتراكمها وتبادلها ، وبالتالي التغلب على التحديات المرتبطة بخلق المعرفة
The concept of tolerance is gaining its importance in the midst of an international society suffering from violence, wars and internal and international crises. It is practiced by extremist and extremist forces and movements acting in the name of religion to exclude the different Muslim and non-Muslim people according to the unethical practices and methodologies of Islamic law and reality. , Cultural, civilization .. that distinguish our world today. The society today is suffering from the ideas of the intellectual and aesthetic views of the different ideologically, ethnically, culturally and religiously in the world of the South. This is what the end-of-history thesis of Fukuyama and the clash of civilizations represented to Huntington.
... Show MoreThis paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreTolerance and its impact on building society