يتناول البحث جزئية من جزئيات موضوع الفسخ المبتسر للعقد
Abstract
Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is “Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim
... Show Moreالمُستلخص:
يتناول هذا البحث موضوعاً يتركز في جانب تحديد مفهوم ومحتوى الإستراتيجية. وقد أشارت الأدبيات إلى عدد من المحاولات التي هدفت إلى تلمس مفهوم ومحتوى الإستراتيجية في منظمات الأعمال، غير أن تلك المحاولات- على الرغم من ندرتها- كانت تتسم بغلبة الأطر النظرية والتعبير عن المفهوم، بالإستناد إلى حوارات فكرية وإرهاصات ذات علاقة بمفهوم ومحتوى الإستراتيجية.
&
... Show MoreIn this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreIn this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show Moreيعيش المجتمع العالمي أزمات بنيوية ونسقيه عميقة واختلالات وظيفية أسهمت في تنامي مظاهر الصراع المختلفة واشتداد تفجر الأزمات الهوياتية وتزايد الامراض الاجتماعية المقضة للعيش المشترك والمربكة لمظاهر التعايش والتآلف مع لجوء إنسان العصر الحالي الى التقوقع والاحتماء والانزواء تحت هويات ضيقة ونحل صغيره في مشهد يظهر مدى تراضي شبكة العالقات الاجتماعية على أداء وظائفها وأصبح عندها الاغتراب والقلق واللاتضامن والع
... Show MoreThe "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreThe study of the language through the prophetic curriculum in general and the semantics in particular through the books of Professor Abdul Salam Yassin, may God have mercy on him and the most distinctive linguistic phenomena, and then study semantics and the most prominent methods that reveal the emotions dominated by this study to indicate the semantics of religious terms In this research we try to dive into the sea of significance to know the relationship between the words and their connotations, and to monitor aspects of semantic development, although we have left non-essential words in order to avoid lengthening. N or three and sometimes Aguetsarna on one example we thought it was enough to clarify the meaning.
The present study aims to explore the effectiveness of a proposed study unit based on the funds of knowledge theory in developing the attitudes towards cultural identity and the proposed study unit. In order to achieve the goal of the study, the two researchers followed the quasi-experimental approach, where the study sample consisted of (28) female students of the fifth-grade at Al-Jeelah Basic Education School, Al-Dakhiliyah Governorate in the Sultanate of Oman. The data were collected by two scales: the first is a scale of attitudes towards cultural identity consisting of (26) items. The second was a scale of attitudes towards the proposed study unit, which consisted of (24) items. The results of the study revealed that the effect of
... Show More