This study aims to explore the relationship between the degree of application of digital leadership and the development of administrative work at the University of Tabuk. It further aims to examine the presence of statistically significant differences between the average responses of faculty members and employees at the University of Tabuk regarding the study axes that are attributed to the following variables: (scientific rank, gender, and job), the study used the descriptive approach in its correlative style, and the questionnaire was used as a tool for data collection, as it was applied to a simple random of (310) members of the faculty and staff. University of Tabuk. The results showed that the degree of digital leadership application at the University of Tabuk is medium, and that the degree of approval of the reality of administrative work at the University of Tabuk is medium. A statistic between the response averages of the study sample members according to the degree variable (assistant professor, associate professor, and professor) in the axes of digital leadership and administrative work at the significance level of 0.05 and 0.01. In favor of an assistant professor, as well as the presence of statistically significant differences in the gender variable for the axes of the study, digital leadership and the development of administrative work, and the absence of statistically significant differences between the responses of the study sample members according to the job variable, for the axes of the study, digital leadership, and the development of administrative work.
This research aims to understand how Middle Eastern issues are addressed in talk shows on foreign Arabic-speaking channels, taking “France 24 Arabic” as a model. It seeks to determine the channel’s level of attention to Middle Eastern issues in talk shows, the nature of the guests invited, the methods used to address the issues, and the professional characteristics of the program host. The study is descriptive-analytical in nature and relies on content analysis of episodes of the weekly talk show “A Week in the World” on France 24 during the period from August 1, 2017, to July 31, 2018. The main findings indicate that foreign Arabic-speaking channels pay attention to covering Middle Eastern issues, especially political and milita
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con
... Show MoreVisceral leishmaniosis is one of the most fatal old-world neglected disease with estimated 90 thousand worldwide cases emerge each year. In Iraq, the cutaneous and visceral form are endemic but available chemotherapies are either toxic with diverse side effects, expensive available drugs or parasite …
Derivatives of Schiff-bases possess a great importance in pharmaceutical chemistry. They can be used for synthesizing different types of bioactive compounds. In this paper, derivatives of new Schiff bases have been synthesized from several serial steps. The acid (I) was synthesized from the reaction of dichloroethanoic acid with 2 moles of p-aminoacetanilide. New acid (I) converted to its ester (II) via the reaction of (I) with dimethyl sulphate in the present of anhydrous of sodium carbonate and dry acetone. Acid hydrazide (III) has been synthesized by adding 80% of hydrazine hydrate to the new ester using ethanol as a solvent. The last step included the preparation of new Schiff-bases (IV-VIII) by the reaction of acid hydrazide with
... Show MoreBased on the German language department’s theoretical and practical aspects as well as educational programs, the present study discusses the semantic relations in text sentences and their role in the science of translation. Through clarifying the semantic relationship between the text sentence and the methods used to express a news item, a situation or an occurrence and through the statement of the multiple theoretical semantic structures of the text’s construction and interrelation, a translator can easily translate a text into the target language.
It is known that language learners face multiple difficulties in writing and creating an inte
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreAbstract
This research aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that
... Show MoreReliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co