The present research aims to test the effect of cognitive complexity as an independent variable in organizational agility as a responsive variable among the leaders working at the headquarters of the Iraqi Petroleum Products Distribution Company.
To conclude a number of recommendations that contribute in the organizational agility in the company, and due to the importance of this research in public organizations and its notable role in community organizations. The research was carried out on a random sample of 101 individuals out of a total of 308, which represents the high leaders in the company (general managers, head of departments, and division officials). A questionnaire was used as information
... Show MoreRetainers have the potential to detrimentally impact periodontal health and contribute to tooth decay.
To investigate periodontal health and bacterial biofilm related to Poly-Ether-Ether-Ketone (PEEK) fixed retainers as compared to Dead-soft coaxial fixed retainer (DSC).
A two-arm parallel groups single-centre randomized c
The research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of th
... Show MorePurpose: The research aims to explore the impact Business Intelligence System (BIS) and Knowledge Conversion Processes (KCP) in the Building Learning Organization (LO) in KOREK Telecom Company in Baghdad city.
Design/methodology/approach: in order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then has tested the search in the telecommunications sector, representatives of one of the telecommunications companies in Baghdad city, has therefore chosen KOREK Telecom company as a sample for research, and the choice was based on the best standard international companies to serve mobile communications in terms o
... Show MoreThe research stems from its goal of identifying the impact of visual management on the strategic acceleration of business organizations and the state of this effect through the knowledge embedding in the Iraqi oil companies. The oil sector was tested, represented by (3) oil companies, and a sample of (151) individuals who participated in activating the visual management, distributed in higher management levels. The research relied on the descriptiveanalytical approach and the questionnaire was a main tool for collecting data and information. The results showed that visual management positively affects strategic acceleration. Moreover, This effect is amplified by the mediating role played by Embedding Knowledge.
This research is a new reading of some of the words in the Holy Quran, which is very old. It is a human reading in which religions are intertwined by recognizing the relationship between man and his fellow man in the unity of existence and the unity of the source of religions and the unity of language. The importance of this research in comparing some of the Arabic words has been contained among books believed by followers that it is from the one God Sunday.
When words are spoken in one way in the form of one creature, from the beginning of creation to the present day, this indicates the single origin of the languages..
The research tools were books of heavenly religions, the Quran, dictionaries and interpretations.
... Show Moreتناولنا في هذه الدراسة التأكيد على تطوير المناهج الدراسية بأتجاه تنمية قيم التسامح والتعايش السلمي ، لان ثقافة التسامح باتت من الضرورات الملحة التي يفرضها الواقع الراهن لمواجهة العنف المجتمعي ، مما يوجب الحرص على ترسيخ القيم الانسانية ، لان التسامح من الصفات التي تحبها النفوس وتنجذب اليها القلوب .
والقيم الاخلاقية والسلوكية كالتسامح وغيرها ، من الامور الرئيسية لعمليتي التربية والتعليم في المدارس وال
... Show MoreAbstract:
The research sought to identify the crises that occurred during the research period and their reflection on the performance of the hotel Research sample as well as to identify the reality of auditing the hotel Research sample and the preparation of a performance audit program can be adopted in auditing the performance of hotels in light of crises, and the problem of the research lies in the lack of a program to audit the performance of hotels that takes into account the crises experienced by the hotel sector, The research was based on solving its problems on three hypotheses, the first is that the performance audit in light of the Covid-19 pand
... Show MoreThis research deals with the hadiths of intimidation. An analytical study of the serious effects of intimidation in society. Intimidation and intimidation of a Muslim is a serious matter, because of the anxiety, intimidation, and dispossession of others ’rights, but some consider it easy, and others intimidate jokingly or seriously, which may lead to such intimidation to have effects Serious.
For intimidation entails the death of the individual, the disappearance of his mind, or the loss of his money, etc., from here the need was urgent; to show the vision of the prophetic Sunnah in denouncing intimidation, so we had this humble research tagged with (hadiths prohibiting the intimidation of a Muslim in the books The six are an analyt
The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show More