Preferred Language
Articles
/
jRdEpY4BVTCNdQwCTFbj
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.

View Publication
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Leader-member Exchange Theory in Strengthening Job Satisfaction (Analytical study of the asiacell telecommunications company)
...Show More Authors

The research aims to formulate a model for research on the dimensions of the Leader-member exchange theory according to the ideas and thoughts of Liden /Maslyn, Hammer and impact on job satisfaction and measure these dimensions at asiacell communications to identify the extent of convergence between theoretical dimensions share leader – member Exchange (LMX) with leadership style used in this company, we have been building scale contains two variables, independent variable Leader-member exchange theory five dimensions (effect , Loyalty, contribution, respect professional, and support) the certified job satisfaction variable dimensions (job security, The Style of management, organizational climate, appreciation, and work itself)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2007
Journal Name
Journal Of Educational And Psychological Researches
اسباب السرقة لدى تلاميذ المرحلة الابتدائية من وجهة نظر المعلمين والمعلمات في المدارس الابتدائية في مدينة المكلا بمحافظة حضرموت
...Show More Authors

يهدف البحث الحالي التعرف على اسباب السرقة لدى تلاميذ المرحلة الابتدائية كما يراها معلموهم ومعلماتهم ، وعن الاساليب المتبعة في معالجة ظاهرة السرقة من قبلهم ، ولقد شملت عينة البحث على ( 200 ) فرداً من معلمي ومعلمات تلاميذ المرحلة الابتدائية في مدينة المكلا للعام الدراسي ( 2004 ـ 2005 ) ، وقد استخدمت الباحثة استبياناً أعدته كأداة للوصول الى اهداف البحث بعد ان تم التأكد من صدقه وثباته ، استخدمت الباحثة معادلة ارتب

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of financial technology in improving the financial performance of banks: A field study on a sample of private banks in Erbil governorate
...Show More Authors

Abstract:

               Today, the financial and banking sector is witnessing a qualitative shift thanks to financial technology services, which provide their services to many individuals and companies in quick, easy and less expensive ways compared to traditional means. Financial technology is a new form of financial science that combines financial transactions and technological skills concerned with providing financial services and improving the work environment within Banking institutions, and financial technology provides many advantages such as lower transaction costs, instant payment, and saving more time and effort in conducting banking

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Moral Intelligence of Internal Auditors in Support of the Performance of Internal Audit Process - Study for Opinions of a Sample of Internal Auditors in Iraq
...Show More Authors

Abstract

      The  aim of  the research to define the concept of moral intelligence and its dimensions and its relationship to some personal characteristics with the internal auditors and identify the importance of the employment of moral intelligence dimensions of (empathy, conscience, self- control, respect, kindness, tolerance, fairness) in the internal audit and the extent of support for the performance of the internal audit process in light of these dimensions. And that by answering the following question : Is there a role for moral intelligence  of  internal auditors in support the performance of internal audit process ? How are employ these dimensions i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The Problems of Teaching Computer Material Concerning Fourth Grade Students’ Point of View of in the Department of Computer College of Education for Women / University of Baghdad
...Show More Authors

The aim of the research is to identify the problems of teaching computer material concerning fourth grade students’ point of view in the computer department in the College of Education for Women by identifying the statistically significant differences between the answers of female students to problems in the field of school administration and in the field of teaching computer subject included the sample of research On (39) of (50) students and (78%) From the fourth grade students in the department of computer who had achieved the theoretical part in the first semester and the assembly application in the second semester in the schools of Baghdad city for the aca

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Impact of Education Program upon Nurses' Knowledge towards Children under Mechanical Ventilation at Pediatric Teaching Hospitals in Baghdad City
...Show More Authors

Objective: impact of the education program for nurses' knowledge toward children under mechanical
ventilation, and to find out the relationships between nurses' knowledge and their general information.
Methodology: Quasi experimental study was carried out at the respiratory care units of Baghdad
Pediatric Teaching Hospitals started from February15th, until September 26th, 2011, A purposive (nonprobability)
sample of (23) nurses working in the respiratory care units, were selected from Children
Welfare and Pediatric Central Teaching Hospitals. The data were gathered through using of the
constructed multiple choice questionnaire using to evaluate the nurses knowledge using checklist, The
questionnaire consists of two p

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Analysis of Verbs Forms in Sa’eed Faeeq’s Short Story: Cloud in the Sky: Sait Faik'in "Havada Bulut" Adlı Hikayesinde Fiil Kiplerinin İncelenmesi.
...Show More Authors

This research paper which is entitled “Analysis of Verbs Forms in Sa’eed Faeeq’s Short Story: Cloud in the Sky” deals with the forms of verbs (i.e., kinds of tenses and suffix analysis). It is one of the applied studies. Verbs are basic elements in Turkish sentences. Their function is to state the predicate which is a sentential essential part. Verbs denote sentence construction, action and formal aspects. Forms are added to the base of verbs in the Turkish language giving the verbs their final structures. Such structures are set in a distinct planned way. The verbs used in the Turkish language which are distinguished by one of these forms are known as simple tense verbs.

Sait Faik'in ( "Havada Bulut" adlı Hikayesinde Fi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
The Problem of Translating Antonyms in The Holy Qur’an into German’’, in an analytical manner: Das Übersetzungsproblem der Antonyme im Heiligen Koran ins Deutsche Analytische Studie
...Show More Authors

The present study is entitled “Problems of Translating Holy Qur’an Antonyms into German: An Analytical Study”. It discusses some of the problems of translating Holy Qur’an verses that contain words so opposite in meaning to another word. The main concern of the study stresses some of the errors in translating the oppositeness of certain words of Holy Qur’an from Arabic into other languages like German, a problem that can be traced back to the fact that such words may have two opposites in meaning, one is considered and the other is completely neglected.

      The errors in translating al Qur’an Antonyms can be summarized for several reasons: literal translation, ignorance of the different view

... Show More
View Publication Preview PDF