This research sought to detect the level of organizational culture prevailing in the Integrity Commission as well as the level of the organizational citizenship behavior of staff of the Commission and the impact of organizational culture in these behaviors. To achieve the objectives of the research and test the validity of hypotheses have been used questionnaire derived from measurements ready modern researchers foreigners have been adapted to suit the Iraqi environment, have been distributed (189) questionnaire on the number of employees from the Integrity Commission, which represented the research sample where the research community has a number is (1365) employees in the Baghdad was the use of a number of statistical met
... Show Moreمع ان افلاطون في الفصلين السابع والعاشر من جمهوريته يعري المسرح بوصفه عالما زائفا يعج بالأخيلة التي يتوجب على المرء ان ينبذها ويتمسك بعالم الحقيقة، الا إن هذا لا يعدم الأثر البالغ الذي تركتهُ أرائهُ على المسرح، قديمهُ وحديثهُ،تجربهً وتنظيرا .إن حكايته الإستعارية للكهف ،والتي تعد مسرحةً للأفكارِ، إن هي إلا وسيلة ينفذ من خلالها الى جوهر المسرح. لذا فان مسرحية ونظرية الكهف قد اصبحت حجر الزاوية في ما قد اص
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More