All domains in this world built based on set of theories. Those theories have been responsible for interpretation of some phenomena and interlocking relationships around us. Commonly, theories are categorized by which aspect is believed. Also,can find a group of theories produced regardingto the leadership domain. This paper will be presented some of these theories like (Great Man Theory, Trait Theory, Behavioral Theories, Contingency Theories, Situational Theory, Transactional Theories, and Transformational Theories). where these theories considered the most popular and common in the field of leader and will be discussed by this work
The American vision of the Non-governmental Organizations in Iraq the topic area of that’s paper dealing with Civil Society as concept and practice, its already consider as Western concept and associated with liberalism and political development, they are many definitions of its but most significantly is all organizations, agencies, trade unions and non-governmental institutions, that’s agencies were established after 2003 and received funds from United States and UN development agencies. The non- governments organizations played a significant role as support and develop many cultural, healthy, educational, and social projects, also that’s organizations try to reduction the effects of terrorists actions especially after ISI
... Show MoreSocial interaction is the platform that enables people to connect and practice language. Active listening stimulates them to understand the language they are speaking. The problem of the study highlights that less attention to listening among speaking, reading, and writing skills causes the weakness of collaborative learning. This paper contributes to characterizing the effectiveness of collaborative learning in developing learner’s listening skills. It aims to underscore the role of target language learners as members of the learning groups and of the teacher in the collaborative learning process. 130 Iraqi EFL teachers from different colleges at the University of Baghdad participated in this study. The scores in the statistical data wer
... Show MoreIn our current era, women need to practice sports activities in order to compensate for the lack of movement. The development of life and the introduction of technology in all fields contributed to reducing body movements to the maximum. Many movements were also shortened, and some parts of the body became almost static. All machines became available in homes. Necessary to help women clean and cook. The presence of transportation also restricted women, so the walking sport that women used to practice when they went shopping in nearby places or to visit friends disappeared. As a result, many health problems emerged, prompting some developed countries to allocate financial aid with the help of insurance companies to these patients.The researc
... Show MoreEvery cultural achievement is a creative text, and every text is a group of signs. The Winged Bull sculpture is a sort of text that is not confined to some signs; indeed, its cultural signs go far beyond as they are open-ended, everlasting and it lends itself to various horizons of interpretation. The recipient has to combine the signs of this sculpture, which belong to different patterns, in the pursuit for perfection so that he can decode its media message.
I have tackled this sculpture by adopting a semiotic approach. The semiotic approach is a modern critical approach which is as wide as culture and as rich as knowledge. It has been linked to modernism, which in turn has been linked to modern critical approaches, because it can
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreDBN Rashid, International Journal of Innovation, Creativity and Change, 2020
Background: The Epstein-Barr virus (EBV) relates to the torch virus family and is believed to have a substantial impact on mortality and perinatal events, as shown by epidemiological and viral studies. Moreover, there have been documented cases of EBV transmission occurring via the placenta. Nevertheless, the specific location of the EBV infection inside the placenta remains uncertain. Methods: The genomic sequences connected to the latent EBV gene and the levels of lytic EBV gene expression in placental chorionic villous cells are examined in this work. A total of 86 placentas from patients who had miscarriage and 54 placentas from individuals who had successful births were obtained for analysis. Results: The research employed QPCR to dete
... Show MoreThis article discusses some of the metaphorical use of language units. Here we will define the basic concepts and underline the causes of this phenomenon. Through research it is proven that through the application of names of some body parts achieves the variety of metaphorical meanings.