The research aims to statement the main obstacles that prevent the application of total quality management (TQM) in a number of Iraqi service organizations, and by one organization in each of the sectors (health, finance, education, higher education, tourism), which are, (Al-Yarmouk Teaching Hospital, Rafidain Bank/ Branch of Hay Al-Arabi Al-Jadid, Al-Karkh/1 Directorate of Education, College of administration and Economics/ Baghdad University, International Palestine Hotel). The research also, tries to classify the priority of the obstacles depending on the type of service organization surveyed. And diagnoses the extent to which or the difference of the research sample members views on the order of obstacles of TQM, and also proposes a
... Show MoreAbstract
The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism
... Show MoreKS Ismaeil, BR Jawad, Journal of Physical Education, 2023
One wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.
natural and non-natural disasters, is an environmental challenges the society and the economy as well as a direct and indirect economic affect, and the units are part of the system overlapping among themselves and thus affected by external indicators, directly or indirectly, these direct effects appear in the destruction or damage inflicted by disasters in property , infrastructure , superstructure , accounting information systems and indirectly in the outcome of future business, comes research problem through access to accounting treatments issued by the Federal Office of financial supervision to address the damage caused by the disasters and prepare the missing financial accounts it turns out us that there is negligence of a nu
... Show MoreThe paper presents an annotated checklist of the Salticidae of Armenia. This study was carried out in 2019-2020 in order to provide an inventory of the Salticidae fauna. Thirteen species are reported for the Armenian fauna for the first time: Afraflacilla epiblemoides (Chyzer, 1891); Aelurillus v-insignitus (Clerck, 1757); Asianellus festivus (C. L. Koch, 1834); Heliophanus dubius C. L. Koch, 1835; Heliophanus kochii Simon, 1868; Heliophanus tribulosus Simon, 1868; Heliophanus curvidens (O. Pickard-Cambridge, 1872); Macaroeris nidicolens (Walckenaer, 1802); Pellenes diagonalis (Simon, 1868); Pellenes geniculatus (Simon, 1868); Pellenes seriatus (Thorell, 1875); Pellenes tripunctatus (Walckenaer, 1802) and Phlegra fasciata (Hahn, 1826).
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show More