The research dealt with the issue of strategic information systems and its impact on the global marketing channel. As the research aims to know the strategic information systems used in the cement company. Which support the senior management in supporting decisions taken in the process of global orientation and moving to foreign markets by choosing the marketing channel that will suit the company. Product and competition with it. With other companies' products. The problem of the study focused on how to move to global markets, and any marketing channel that can be followed to move the cement product globally, what are the strategic information systems used in the company and how will it contribute to supporting senior management decisions directed for this purpose? The study was conducted in the General Company for Iraqi Cement for a sample that included the company’s advanced owners, and the answers received amounted to (126) answers. The researcher used the software (SPSS V.26), in analyzing the results obtained from the research sample. And the research reached a set of conclusions, the most important of which is the weakness of the process of applying some strategic information systems within the company. The research reached a set of recommendations, the most important of which is that the Iraqi Cement Company should work on using strategic information systems. Including (GAS, NNS) systems to help other systems support the company's future decisions.
This experiment examined the effects of adding sodium alginate and KOJIC acid as substitutes of Conventional antibiotics to soybean lecithin extender on the characteristics of cryopreserved and frozen buffalo bull semen, as well as evaluation of their additions as antibiotics that to help lowering the microbial load. Following the collection and dilution of in the soybean lecithin extender, the experimental treatments were separated into five groups, as follows: T1: (control-) without adding any antibiotics; T2: (control+) adding the conventional antibiotics Gentamicin 0.4 IU and Tylosin 0.08 IU per 100 ml; T3: adding Kojic acid at (0.06 g/L) T4: adding sodium alginate at (0.6 mg/mL)T
Goal of research is to investigate the impact of the use of effective learning model in the collection of the fourth grade students/Department of physics in the material educational methods and the development of critical thinking .to teach this goal has been formulated hypothesis cefereeten zero subsidiary of the second hypothesis .To investigate the research hypothesis were selected sample of fourth-grade students of the department of physics at the univers
... Show MoreInformation pollution is regarded as a big problem facing journalists working in the editing section, whereby journalistic materials face such pollution through their way across the editing pyramid. This research is an attempt to define the concept of journalistic information pollution, and what are the causes and sources of this pollution. The research applied the descriptive research method to achieve its objectives. A questionnaire was used to collect data. The findings indicate that journalists are aware of the existence of information pollution in journalism, and this pollution has its causes and resources.
Background: Laparoscopic cholecystectomy (LC) has become the treatment of choice for elective cholecystectomy.Objectives: To evaluate the safety and feasibility of early LC for AC and to compare the results with delayed LC.Methods: A prospective study done from April 2011 to October 2013, 88 patients with diagnosis of AC were divided randomly into two groups according to the mode of treatment; (early group n=40) treated by early LC within first 72 hours or (delayed group, n=48) initial conservative treatment for 4-6 weeks, followed by delayed LC.Results: There was no difference between the two groups (early & delayed LC), operating time (early 80min, delayed70min), conversion rate (early 7.5%, delayed 6.25%),postoperative complicatio
... Show MoreVerbal Antonyms: A research in the relationship in meaning Between the words in Arabic language
In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm
The aim of the research is to find out the availability of the requirements of applying the indicators of school performance system in the public schools in Mahayel Asir educational directorate through the school planning indicator, the safety and security indicator, the active learning indicator, the student guidance indicator and determining the existence of statistically significant differences between the responses of the research community according to the variable of (scientific qualification - years of work as a principal - training courses). The questionnaire was used as a tool for data collection from the research community, which consists of all the public schools’ principals (n=180) Mahayel Asir educational directorate
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show More