Preferred Language
Articles
/
eRZCIocBVTCNdQwCjDmt
Leadership theories in management and psychologist educational filed
...Show More Authors

All domains in this world built based on set of theories. Those theories have been responsible for interpretation of some phenomena and interlocking relationships around us. Commonly, theories are categorized by which aspect is believed. Also,can find a group of theories produced regardingto the leadership domain. This paper will be presented some of these theories like (Great Man Theory, Trait Theory, Behavioral Theories, Contingency Theories, Situational Theory, Transactional Theories, and Transformational Theories). where these theories considered the most popular and common in the field of leader and will be discussed by this work

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 22 2010
Journal Name
Journal Of Al-nahrain University
STUDY THE STRUCTURAL AND ELECTRICAL PROPERTIES OF CdTe:Ag THIN FILMS
...Show More Authors

The influence of silver doped n-type polycrystalline CdTe film with thickness of 200 nm and rate deposition of 0.3 nm.s -1 prepared under high vacuum using thermal co-evaporation technique on its some structural and electrical properties was reported. The X- ray analysis showed that all samples are polycrystalline and have the cubic zinc blend structure with preferential orientation in the [111] direction. Films doping with impurity percentages (2, 3, and 4) %Ag lead to a significant increase in the carrier concentration, so it is found to change from 23.493 108 cm -3 to 59.297 108 cm -3 for pure and doped CdTe thin films with 4%Ag respectively. But films doping with impurity percentages above lead to a significant decrease in the electrica

... Show More
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 28 2022
Journal Name
The Open Dentistry Journal
Depression, Anxiety and Stress Among Dentists During COVID-19 Lockdown
...Show More Authors
Introduction:

The objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.

Methods:

A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.

Results and Discussion:

Being unsatisfied with the job was as

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Al-Hafizh Abdan al-Ahwazi, 306 And his modern efforts
...Show More Authors

Abadan, one of the modernists, is the critics, whose words depend on the wound, the modification and the ills of the hadeeth.
He lived Abadan, age in the request to talk and take the elders, and Awali, and attribution, which affected him by taking, and update about (300) Sheikh or more.
Abadan also excelled in the novel and its origins, which made students talk to him, and ask for the novel, with his hardness and hardship. As we will see in the folds of the search

View Publication Preview PDF
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Apr 02 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Phosphodiester Conjugation of Metronidazole and Dexamethasone as Possible Mutual Prodrug
...Show More Authors

As possible mutual prodrug had been synthesized that contain metronidazole and dexamethazone conjugated through phosphodiester linkage. The rationale for this type of conjugate is to get a prodrug with possible site – specific delivery of its active constituents into the lower parts of the G.I.T.

This compound was synthesized by the reaction of dexamethzone – 21 – phosphate with metronidazole to form:(1 – (dexamethazone – 21 – phosphoryl) – metronidazole)

   This conjugate was performed using dicyclohexylcarbodiimide (DCC) as a condensing agent. The identity of the prepared compound had been confirmed using T.L.C., U.V. spectroscopy, IR spectrosco

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Engineering
Buckling Loads and Effective Length Factor for Non-Prismatic Columns
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Evaluating the Performance of Combined Equipment (RAU) and Field Tested
...Show More Authors
Abstract<p>An experiment was carried out evaluate the performance of RAU combined equipment under three levels of practical speed, (V1) 4.06 km. h<sup>-1</sup>, (V2) 4.43 km. hr<sup>-1</sup> and (V3) 5.76 km. hr<sup>-1</sup>, and three levels of depth with 10,20and 30 cm. It is denoted by D1, D2, D3 respectively. A split plot design was used within the RCBD design with three replications. The experiment results showed that the first practical speed 4.06 km.hr<sup>-1</sup> achieved the lowest slippage percentage from 9.61%, lowest traction power 14.65hp, lowest soil penetration resistance to1.34 kg.cm<sup>-2</sup>, and the highest total operating </p> ... Show More
View Publication
Scopus (3)
Scopus Crossref