The art of batik is one of the ancient arts that has a long history in East Asian countries, especially in Indonesia, where it was considered a traditional craft with which many Indonesian tribes lived. This art began to move to other continents and develops and progresses due to the artist’s connection to the surrounding technological and intellectual development, as art became more outgoing and liberated, it helped the artist to create and innovate in his designs. In this research, he focuses on modern performance methods through which print paintings can be produced through design elements, especially calligraphy, to create aesthetic and creative effects in the productive work. The current research aims to identify the various perfo
... Show MoreThe current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question: “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.
The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat
... Show MoreThe research aims to; identify the management of conflict as perceived by secondary school managers toward the directors of directorates of education in wassat province, identify functional performance as perceived by secondary school managers toward the directors of directorates of education in wassat province. Besides, explore the relationship between Conflict management and functional performance among the directors of directorates of education in wassat province. A descriptive approach deemed more appropriate with study design. As a tool to collect the data of current research, the author used a questionnaire. Spss tools were used for data analysis
Abstract:
This research aims to apply the Performance Focused Activity Based Costing System in the consultant office of Al-Khwarizmi College of Engineering at the University of Technology for the purpose of measuring the cost of consulting services provided by these offices in order to reduce costs and their reflection in achieving profits. For the purpose of calculating costs accurately, and to test the hypothesis of the research, the research was applied in the office of the consultant of the College of Engineering Al-Khwarizm - University of Baghdad through the financial statement
... Show MoreThe aim of present study to investigate the effect of Coraindrum sativum leaves extract on reproductive activity of male albino mice .Thirty male mice with age of 80-100 day and weight between 25-30 g were divided into three groups: group 1 (untreated), group 2 and 3 were administrated orally for 30 days with aqueous extract of Coraindrum sativum leaves at dose 125 and 250mg/kg.b.w. respectively. The following parameters were evaluated: serum testosterone levels, testes weights, sperm characteristics [motility, viability, spermatozoa, morphology and concentration] and histology changes of the testis. The results showed that the treatment caused highly significant degrease (P<0.01) in testosterone levels and the weight of testes assoc
... Show MoreThe research aims to: build and record a measure of cognitive participation among second-year female students at the College of Physical Education and Sports Sciences, University of Baghdad. The researchers used the descriptive approach in the survey style for the research sample. The sample was selected from female students and divided into: (10) female students for the survey sample, and (80) female students for the construction and codification sample. The data were statistically analyzed by the researchers using SPSS, the T-test for independent and correlated samples, Pearson's simple correlation coefficient, Cronbach's alpha, Chi-square, and Spearman-Brown. They were recruited for the samples. The study concluded that constr
... Show MoreCefixime is an antibiotic useful for treating a variety ofmicroorganism infections. In the present work, tworapid, specific, inexpensive and nontoxic methods wereproposed for cefixime determination. Area under curvespectrophotometric and HPLC methods were depictedfor the micro quantification of Cefixime in highly pureand local market formulation. The area under curve(first technique) used in calculation of the cefiximepeak using a UV-visible spectrophotometer.The HPLC (2nd technique) was depended on thepurification of Cefixime by a C18 separating column250mm (length of column) × 4.6 mm (diameter)andusing methanol 50% (organic modifier) and deionizedwater 50% as a mobile phase. The isocratic flow withrate of 1 mL/min was applied, the temper
... Show MoreCoupling reaction of m-and p- amino acetop henone and p-amino benzoic acid with (LHistidine) gave the new bidentate azo ligands (L1, L2 and L3). The prepared ligands were identified by FT-IR, UV-Vis, 1HNMR and GC- mass sp ectroscopic technique. Treatment of the prepared ligands with the following metal ions (CoII, NiII, CuII, ZnII, CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M (L)2 Cl2]. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis and 1HNMR spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the com
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe performance of job effectively requires narrowing the meaningful routine activities and attempting employing the job procedures in favor of public welfare through adding the green impact as well as removing them from the red tapes which reflect the firmness of procedures, to enable the job parties to make their job independently, and pushing them to gain priority in the competition layer. This is not attaining easily amidst the regulatory problems expressed by the complication of procedures, the thing which make identifying the problem of the study through the following question:
Should we make the complex of procedures and their firmness a way to adopt the idea of the green regulatory tapes supportin
... Show More