W Tarik A, AW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 2
The purpose of the research is to study the impact of knowledge management (personalization and coding strategy) in achieving strategic excellence in the environment of Iraqi private banks, and the descriptive and analytical research approach has been adopted, so the researcher adopted positive philosophy according to the deductive approach for the purpose of deriving the first research hypothesis from the theoretical side and the research reached a group of The most important results are that the personalization strategy has made great progress in its ability to influence strategic superiority as a responsive variable, as the civil bank departments were successful in employing the changes that occurred in the personalization str
... Show MoreThe childhood stage is considered the most important stage of all the stages through
the human being’s life. In this stage the human being will be more affected by the various
factors that surround him/her. The first five years of his/her life leave a great impact not only
on the human being personality, but also on his/her whole life. Therefore, it is worthwhile tobe concerned with and focus at the raising up and the teaching of the child during the
childhood stage.
The mission of raising up children in this era - the era of globalization and information
bursting or news flooding – has become a very difficult or even an impossible mission.
Furthermore, not only in the Arabic world, but also all over the world, t
The self-awareness interactions reflects with emotions,assess the child in respect to its relations with the social standards; they are not merely simply reactions , but rather they connect with his moral behavior and other 's thinks. When the self- awareness gets developed with emotions within the child , the latter become highly sensitive, causing him prone to be blamed . AS a result , the children test the self –awareness interactions with emotions and in age 3 years , where the self –awareness interactions with emotion clearly link to the self- assessment. The children in stage of kindergarten could not describe the self-awareness interactions accurately ; they test it under different circumstances in comparison to the youngest o
... Show MoreThe Objective of the research is to identify the Strategic Vigilance and effect in the Managerial Decision Quality, by knowing the interest of the organization influence the Strategic Vigilance in the Managerial Decision Quality, adopted four dimensions of the Strategic Vigilance is (Environmental Vigilance, Commercial, Competitiveness & Technology) to indicate the extent individually and collectively impact in the Managerial Decision Quality, The questionnaire was used as a main tool to survey the views of a sample of 45 managers, was named Supreme Judicial Council society for research, and the statistical program SPSS, and research found a clear positive impact dimensions Strategic Vigilance in the Manageri
... Show MoreThis research aims to clarify the role of Information Technology Competency (ITC) with dimensions' (IT Usage, IT Knowledge, and IT Operations) as an independent variable in the activation of Human Resources Management Practices (HRM Practices) as a dependent variable with dimensions' (Training and Development, Recruitment, Job Design, and Performance appraisal). Based on this, the correlation and effect relationships between the independent and dependent variables are determined by formulating two main hypotheses. There are a significant relationship and effect of IT competency with HRM practices within the dimensions. Furthermore, the scope and population of this research are the Informatics and Communications P
... Show MoreAdhesion (type 1 fimbriae) and host defense avoidance mechanisms (capsule or lipopolysaccharide) have been shown to be prevalent in Escherichia coli isolates associated with urinary tract infections. In this work, 50 uropathogenic Escherichia coli (UPEC) isolated from children with urinary tract infections were genotypically characterized by polymerase chain reaction (PCR) assay. We used two genes; fimH and kpsMTII, both of them previously identified in uropathogenic E.coli (UPEC) isolates. The PCR assay results identified fimH (90.0)% and kpsMTII (72.0)% isolates. In the present study, was also demonstrated that these genes may be included in both or one of them within a single isolate.
Background: Pain and the usage of local anesthetic agents are still real problem in pediatric dentistry, for these reasons, the use of minimal invasive dentistry (MID) in regard to the patient comfort is important especially for children, anxious and uncooperative patients. Chemomechanical caries removal (CMCR) methods involve the selective removal of the carious dentine hence it avoided the painful removal of the sound dentine and the anxiety resulted due to the vibration of the hand piece which is also decreased thus it appears to be more acceptable and comfortable to the patient. Aims of this study: This study was conducted among group of children to assess and compare the anxiety rating scale (during and after treatment) between the
... Show MoreBackground: The immunogenetic predisposition
may be considered as an important factor for the
development of Type 1 Diabetes Mellitus (T1DM)
in association with the HLA antigens.
Objective:This study was designed to investigate
the role of HLA-class II antigens in the etiology of
type T1DM and in prediction of this disease in
siblings, and its effect on expression of glutamic
acid decarboxylase autoantibodies (GADA).
methods:Sixty children who were newly diagnosed
type 1 diabetes (diagnosed less than five months)
were selected. Their age ranged from 3-17 years.
Another 50 healthy siblings were available for this
study, their ages range from 3-16 years. Eighty
apparently healthy control subjects,
A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c