هدف البحث الى بيان طبيعة ارتباط والتأثير بين الضغوط التنافسية (المتغير المستقل) والتجديد الاستراتيجي (المتغير التابع) ، تم تطبيق البحث في فنادق الدرجة الممتازة في بغداد. وبلغت عدد افراد عينة البحث (99) مديراً يعملون في (6) فنادق من الدرجة (الممتازة) ببغداد، وهي (فندق الرشيد، فندق عشتار، فندق ميريديان، فندق المنصور، فندق بابل، وفندق بغداد) وتم اجراء التحليل الاحصائي باستخدام البرنامج الاحصائي AMOS وظهرت وجود تنافسية عالية بشأن الخدمة التي تقدمها الفنادق من وجهة نظر المبحوثين ، وهناك ارتباط وتأثير للضغوط تنافسية في التجديد الاستراتيجي ، وان يولي المديرين اهتماماً استثنائياً بموضوعات (الضغوط التنافسية والتجديد الاستراتيجي) وينبغي تضمينها في توجهاتهم الاستراتيجية ، و وكانت الاستبانة هي الاداة الرئيسة لجمع البيانات من المستجيبين، توصل البحث الى عدد من النتائج ، من ابرز النتائج وجود علاقة ارتباط ذات دلالة احصائية معنوية بين الضغوط التنافسية والتجديد الاستراتيجي ، فضلا عن وجود تأثير للضغوط التنافسية في التجديد الاستراتيجي على المستوى الكلي وعلى مستوى الابعاد الفرعية
Myocardial infarction (MI) is a prevalent disease and is expected to become the main cause of death globally in the future The pathophysiology of MI is tightly linked to the activation of the NLRP3 inflammasome. This study involves 60 subjects who were enrolled in the Intensive Care Unit (ICU) at Ibn Al-Bitar Center for Cardiac Surgery. Patients admitted to the ICU at Baghdad Teaching Hospital and Ibn Al-Bitar Cardiac Surgery Center were included in this study, conducted from November 26, 2023, to November 20, 2024. The control group also consisted of 60 subjects, In this study ,uric acid , urea , creatinine ,Glutamic Pyruvic Transaminase (GPT) Glutamic Oxaloacetic transaminase (GOT) , Gamma Glutamyl Transferase (GGT) ,NLPR3, NT-pro
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreA new generalizations of coretractable modules are introduced where a module is called t-essentially (weakly t-essentially) coretractable if for all proper submodule of , there exists f End( ), f( )=0 and Imf tes (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.
The present article discusses the synthesis of tetradentate Schiff base complexes formed by the condensation reaction of 2-hydroxy benzaldehyde and phthalohydrazide. The ligand (LH2) was detected using FT-IR spectra, 1H, 13C-NMR, UV-Vis spectroscopy, elemental microanalysis CHN, and mass spectrometry. The obtained solid complexes have been assessed using physicochemical and spectroscopic techniques, including UV-Vis, FT-IR, nuclear magnetic resonance (1H-NMR, 13C-NMR), mass spectrometry, thermal gravimetric analysis (TGA), and atomic absorption, in addition to complex conductivity and magnetic moment measurements. The infrared results demonstrated that ligands functioning as tetradentate ligands are chelated to metal ions via the ph
... Show MoreThe presented study investigated the scheduling regarding jobs on a single machine. Each job will be processed with no interruptions and becomes available for the processing at time 0. The aim is finding a processing order with regard to jobs, minimizing total completion time , total late work , and maximal tardiness which is an NP-hard problem. In the theoretical part of the present work, the mathematical formula for the examined problem will be presented, and a sub-problem of the original problem of minimizing the multi-objective functions is introduced. Also, then the importance regarding the dominance rule (DR) that could be applied to the problem to improve good solutions will be shown. While in the practical part, two
... Show MoreComplexes ofCo(ll),Cu(||),Ni(||),pt(|| ),and pd(||) with N3O-chelating Ligand Incorporating Azo and Shiff Base Moieties ;synthesis, spectroscopic ,Thermal Decomposition Theoretical
RKASFH Ghanim, Ibn Al -Haitham Journal for pure and applied science, 2017
The adsorption process of reactive blue 49 (RB49) dye and reactive red 195 (RR195) dye from an aqueous solutions was explored using a novel adsorbent produced from the sunflower husks encapsulated with copper oxide nanoparticle (CSFH). Primarily, the features of a CSFH, such as surface morphology, functional groups, and structure, were characterized. It was determined that coating the sunflower husks with copper oxide nanoparticles greatly improved the surface and structural properties related to the adsorption capacity. The adsorption process was successful, with a removal efficiency of 97% for RB49 and 98% for RR195 under optimal operating conditions, contact time of 180 min, pH of 7, agitation speed of 150 rpm, initial dye concentration
... Show More