اليورانيوم المنضب واستخدامه امريكياً في العراق
Abstract
The study aims to identify the levels of core competencies dimensions and types of organizational flexibility in the investigated organization, as well as to determine the nature of the relationship and the impact of core competencies dimensions with the process of organizational flexibility. Thus, a number of research questions were presented to express the research problem as follows:
- What is the level of the investigated individuals' awareness to core competencies and organizational flexibility across their dimensions and types in the investigated organization?
- To what extent are core competencies and organizational flexibility available in the Organiz
Importance of study :
The interesting of industrial sector and developing it after corner stone. It is important to build economic balanced and get behind and front linkage for transformative industrials, and this is important to get balanced.
The value of transformative industry sector is more important than other sectors in economy, and this is reflect the capital in industrial sector .Industry sector is larger than other sectors ,so it regards the motive which moving the economic wheel .
The problem :
The research treats reduction and retreat the ind
... Show MoreObjective: To determine the effectiveness of an Educational Program in Enhancing Nurse’s Knowledge about Occupational Health Hazards at Medical City Hospitals in Baghdad City.
Methodology: The present study employed a quasi-experimental design held at Medical City Hospitals in Baghdad City. A non-probability sample (convenience sample) consisted of (60) nurse. Data were collected by using a self-report questionnaire which consisted of six parts (a) socio-demographic characteristics (b) physical hazards knowledge (c) chemical hazards knowledge (d) biological hazards knowledge (e) psychological hazards knowledge and (f) mechanical hazards knowledge. Data were analyzed using the statistical packag
... Show MoreAddressed the problem of the research is marked (technical openness in the formation of post-modernism - Pop Art an Example) the nature of the technical expansion of the output artifacts postmodern, and the nature of the raw materials taken as components of its sensual. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. From then select the search goal (revealed openness to hire technical material in the art of Pop Art), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indi
... Show MoreResearch aims to identify the immediate impact of the announcement of mergers in the stockholders and the feasibility of gain abnormal return and benefiting from asymmetric information during the announcement that unite 30 days before the announcement of the merger, and announcement day, and 30 days after the announcement of the merger. It was the largest and most important mergers and acquisitions pick that occurred during the global financial crisis, specifically in health care/pharmaceutical industry, Pfizer and Wyeth merger with Novartis acquisition on Alcon. search has adopted three hypotheses: the first hypothesis that ((achieves the target company's shareholders positive abnormal return (or negative) during and befor
... Show MoreThe research seeks to identify the impact of fraud detection skills in the settlement of compensatory claims for the fire and accident insurance portfolio and the reflection of these skills in preventing and reducing the payment of undue compensation to some who seek profit and enrichment at the expense of the insurance contract. And compensatory claims in the portfolio of fire and accident insurance in the two research companies, which show the effect and positive return of the detection skills and settlement of the compensation on the amount of actual compensation against the claims inflated by some of the insured, The research sample consisted of (70) respondents from a community size (85) individuals between the director and assistan
... Show MoreThe social networking sites have brought about fundamental changes and a qualitative shift in the marketing industry and its strategies. The Iraqi ministries have used this site i.e. Facebook to spread and disseminate values in order to consolidate it in Iraqi society which has witnessed many changes in all aspects of life.
The researcher studies the pages of both ministries to know the values contained in the publications of the pages of these two ministries, the quality of grooming as well as the forms in which these values are marketed.
The researcher uses a survey method and content analysis for the publications of these two pages during the study period starting from January 1, 2
... Show MoreIn this work, the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More