This paper aims to prove an existence theorem for Voltera-type equation in a generalized G- metric space, called the -metric space, where the fixed-point theorem in - metric space is discussed and its application. First, a new contraction of Hardy-Rogess type is presented and also then fixed point theorem is established for these contractions in the setup of -metric spaces. As application, an existence result for Voltera integral equation is obtained.
The primary objective of this research is to determine the best EDI
software application that meets the users' requirements, and to show
the functionality potentially presented in any software of electronic
data interchange (EDI) system. Also, in this paper, will be addressed
issues relating to integration EDI system into business process, and
the issues regarding the performance of EDI application will also be
discussed
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreThe research is based on a statement of the effect and nature of the relationship of elements of promotional mix represented by (advertising, personal selling, sales promotion, public relations and direct marketing) as the independent variable in the dependent variable represented in the competitive advantage in the General Company for the manufacture of medicines and medical supplies Samarra. Analytical descriptive in the theoretical side, through the use of a number of literature from scientific sources (books, research and studies published in Arab and foreign magazines) was also relied on the methodology of the case study in the practical side, Data collection using the questionnaire tool, which was designed using the triangular Like
... Show MoreThe research aims to know the influence of the intellectual capital on the internal control system in a sample of General Inspection Offices in Iraq. The research includes a sample of individuals who are working in these offices total sample (46) individuals distributed according to functional levels (General Inspector, Deputy Inspector General, and Director) , The data and information were collected by using questionnaire, which is done for this purpose, as well as personal interviews in order to reach to the results that achieve the aim of this research , Two hypotheses were formed , the first hypothesis consists of (4) secondary hypothesis , All these hypotheses were tested by using statistical tools such as (percentages, freq
... Show MoreIt is axiomatical that the narrative prospective is profoundly significant to the writer who intends to commence his sketch of projected novel. It is the pillar of comprehensive absorbing as the writer should commit himself to circular his own concepts to the reader of his narrative characters.
The dilemma of plot-perception is a twofold aspect; partly offers the question: what is the authors stand in regard to his characters? And: what is the aim of this theme? These correlative questions are inseparable since the reader who wishes
... Show MoreAbstract
Objectives: this study aims to: (1). Assess self-esteem level and academic achievement for students of nursing colleges in southern Iraq. (2). Determine the relationship between levels of self-esteem and academic achievement of the student in the first semester. (3). Identify differences of self-esteem with gender and different age groups.
Methodology: a sample of (426 students) was purposively selected then collected by using a questionnaire which consisted of: I- Sociodemographic characteristics for assessing some important aspects of students, II- Rosenberg's Self-Esteem Scale (RSES) III- Iraq Grading Scale for assessing student achievement. Finally statistical analysis (SPSS) for data processing.
Results: study resu
Objectives: The study aims to assess and evaluate the caregivers knowledge about management of the children with growth hormone deficiency and to find out the relationship between caregivers kowledge and caregivers age, gender, number of individual in house hold, Date of treatment started ,Caregivers level education and economic status Methodology: Quazi expermental study design was carried out at (Child's Central Teaching Hospital, Medical City of Al Imamian Al Khadhmain Teaching Hospital, and National Centre for Treatment and Research of Diabetes,Specialized Center for Endocrine Diseases and Diabetes, and Department of Medical City Children Welfare Teaching Hospital started from
... Show More