The current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and two external analysts, where the agreement coefficient between the researcher and the first analyst reached 83.05%, while the agreement coefficient between the researcher and the second analyst reached 80. 35%. The G. Cooper equation was adopted to extract the stability and percentage as a basis for the frequency of needs in the research sample. The results of data analysis showed the presence of (811) ideas that express needs, according to which the first nine needs were chosen on the basis that they are the most emphasized needs in the sample of analyzed stories, which are: 1. n Cognizance / 2. n Aggression / 3. n Dominance / 4.n Nurturance / 5. n Deference / 6. n Harmavoidance / 7. n Inhibition / 8. n Decite / 9. n Recognition . From the same standpoint, the last nine needs were chosen on the basis that they are the least certain needs, which are: 1. n Exhibition /2. n Seclusion / 3. n Noxavoidance / 4. n Intensity / 5. n Abasement / 6. n Autonomy / 7. n Retention / 8. n. Affiliation /9. n Sex . The researcher concluded his research with a set of recommendations and proposals.
Purpose: The research aims to explore the impact Business Intelligence System (BIS) and Knowledge Conversion Processes (KCP) in the Building Learning Organization (LO) in KOREK Telecom Company in Baghdad city.
Design/methodology/approach: in order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then has tested the search in the telecommunications sector, representatives of one of the telecommunications companies in Baghdad city, has therefore chosen KOREK Telecom company as a sample for research, and the choice was based on the best standard international companies to serve mobile communications in terms o
... Show MoreThe research aims to improve operational performance through the application of the Holonic Manufacturing System (HMS) in the rubber products factory in Najaf. The problem was diagnosed with the weakness of the manufacturing system in the factory to meet customers' demands on time within the available resources of machines and workers, which led to time delays of Processing and delivery, increased costs, and reduced flexibility in the factory, A case study methodology used to identify the reality of the manufacturing system and the actual operational performance in the factory. The simulation was used to represent the proposed (HMS) by using (Excel 2010) based on the actual data and calculate the operational performance measures
... Show MoreThe paper deals with the study of the sciences of the Qur’an according to the interpreter, Ayatollah Sayyid Mahmoud al-Talaqani, a religious jihadist figure from Iran. He is the author of the exegesis (Ishraq from Al-Quran), which consists of six parts, which he wrote inside the prisons of the Shah and in exile. Mr. Al-Talaqani agreed with some of the commentators in his positions on the sciences of the Qur’an, and some of them disagreed with others.
The novel is the revelation of the attitudes of every age. And the writers do not know the winner of their stroke to express these events، The research has been working on a descriptive-analytical approach based on the American Comparative School، Al-Shahez's novel explores the work of the nobly and the film by Hamoun by Dariush Mehrjui By relying on the main characters of these two narratives, they depict a picture of Egypt and Iran From the symbolic lines of these works. In fact, the authors of this research have tried to initiate the introduction and analysis of these two works In fact, the authors of this research have tried to initiate the introduction and analysis of these two works.
The results of the research show that
... Show MoreThe objective of the study is to demonstrate the predictive ability is better between the logistic regression model and Linear Discriminant function using the original data first and then the Home vehicles to reduce the dimensions of the variables for data and socio-economic survey of the family to the province of Baghdad in 2012 and included a sample of 615 observation with 13 variable, 12 of them is an explanatory variable and the depended variable is number of workers and the unemployed.
Was conducted to compare the two methods above and it became clear by comparing the logistic regression model best of a Linear Discriminant function written
... Show MoreIslamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
It is known that the Sunnah commanded to follow is the
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreIn most recent studies, long-term retention after orthodontic treatment has been hypothesized that may be necessary to maintain the stability of the dentition and avoid post-treatment changes. The bonded fixed retainer is characterized by its clinical effectiveness, patient acceptance, and lack of patient complaints as compared with a removable retainer. An electronic database (such as PubMed, PubMed Central, Web of Science, Science Direct, Cochrane Library, Scopus, and ResearchGate) has been collected using specific keywords. Of the 152 articles, only randomized clinical trials that investigated different types of fixed retainers or compared fixed with removable retainers were illustrated in tables and included in this review. The
... Show More
