This article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, institutes, co-occurrence, and author’s keywords. The findings imply that intellectual capital researchers do not use broad relevant theories and findings from studies beyond their clusters. Another result is that developing nations continue to be underexplored in terms of intellectual property research due to a lack of trust representation and a lack of appropriate investigators. Finally, the data analysis identifies a number of potential research issues to be investigated regarding intellectual capital development, which serve as raw material for future research. Once again, this study provides a framework for firms to build and implement intellectual capital development plans.
The current research aims to provide a conceptual and applied frame on the subject of multi- level analysis in the research of business administration. The research tries to address some of the problems that befall the preparation of research and studies at the Arab level and local level, where the unity of theory and measurement and analysis, as well as clarify the various types of conceptual constructs and give researchers the ability to distinguish different models related to the level of analysis. On the other hand, this research provides an example of
... Show Moreتحليل الشراكات التجارية للعراق 2003-2013
In this study, the synoptic analysis of dust storm for spring and summertime in Iraq were investigated. The images for dust provided by NASA are used to emphasize the dust storm days, while the composite maps of wind vector and geopotential 850hPa are mapped to investigate the pressure and wind direction patterns appearing with the dust condition in the same days. Spring has more dust frequency than summertime, especially in May. The frontal type of dust storm is dominant on spring, the cold air pushes the warm air that picking up the sand to the air through the vertical wind, but the southwestern high-speed wind and drought condition were controlled on the dust in summer. The northwestern wind is the main factor that carries the dust for l
... Show MoreVoice over Internet Protocol (VoIP) is important technology that’s rapidly growing in the wireless networks. The Quality of Service (QoS) and Capacity are two of the most important issues that still need to be researched on wireless VoIP. The main aim of this paper is to analysis the performance of the VoIP application in wireless networks, with respect to different transport layer protocols and audio codec. Two scenarios used in the simulation stage. In the first scenario VoIP with codec G.711 transmitted over User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and Real-Time Transport Protocol (RTP). While, in the second scenario VoIP with codec G.726 transmitted over UDP, SCTP, and RTP protocols. Network simulator
... Show MoreIn this paper, the discriminant analysis is used to classify the most wide spread heart diseases known as coronary heart diseases into two groups (patient, not patient) based on the changes of discrimination features of ten predictor variables that we believe they cause the disease . A random sample for each group is employed and the stepwise procedures are performed in order to delete those variables that are not important for separating the groups. Tests of significance of discriminant analysis and estimating the misclassification rates are performed
Literary works include, for the most part, text thresholds, which are the first entry into reading them and understanding their connotations, and (literary works) vary according to text thresholds, some of which are limited to the title and on the cover page only, and others, in addition to these two thresholds, are based on the dedication threshold too, and others ...
This study takes the story of "Mamo Zain" of the poet Ahmed Al-Khani and his translator Sheikh Muhammad Ramadan Al-Bouti as the field of study, as it is a unique literary work, which included a number of textual thresholds which supported each other and cooperated with the content of the work.
The threshold of dedication in the story of "Mamo Zain" was a spee
... Show MoreThe research aimed to modeling a structural equation for tourist attraction factors in Asir Region. The research population is the people in the region, and a simple random sample of 332 individuals were selected. The factor analysis as a reliable statistical method in this phenomenon was used to modeling and testing the structural model of tourism, and analyzing the data by using SPSS and AMOS statistical computerized programs. The study reached a number of results, the most important of them are: the tourist attraction factors model consists of five factors which explain 69.3% of the total variance. These are: the provision of tourist services, social and historic factors, mountains, weather and natural parks. And the differenc
... Show MoreStart your abstract here the objective of this paper is to study the dynamical behaviour of an eco-epidemiological system. A prey-predator model involving infectious disease with refuge for prey population only, the (SI_) infectious disease is transmitted directly, within the prey species from external sources of the environment as well as, through direct contact between susceptible and infected individuals. Linear type of incidence rate is used to describe the transmission of infectious disease. While Holling type II of functional responses are adopted to describe the predation process of the susceptible and infected predator respectively. This model is represented mathematically by
A total of 13 samples of domestic cat Felis cattus (Linnaeus, 1758 ) and 9 samples of wild cat Felis chaus furax (de Winton, 1898) of the Felidae Family were trapped and examined to detect the hard ticks. The areas of the collection were: Baghdad, Al-Rashidiya, Tharthar, Nahrawan, AL-Mahmoudiya (middle of Iraq) and AL-Haretha (south of Iraq), Mosul (north of Iraq). The results of the current study revealed that four species belong to two genera of hard ticks: Haemaphysalis sp. (Koch, 1844), Rhipicephalus turanicus (Morel, 1969), Rhipicephalus sanguineus (Neumann, 1904) and Rhipicephalus appendiculatus (Santos, 1955). The rates and the density of infestation were discussed. The current study aimed to clarify the infestation differe
... Show More