It is necessary to examine the nature of the Turkish position and what Turkey seeks to achieve at the international, regional and Iraqi levels. Or is this external role an expression of foreign policy and has not yet reached the level of maturity that reaches the stage of strategy? The answer to this question is the essence of research in the Turkish role. The answer to this question requires the realization of the elements and pillars that guarantee Turkey's continuity and survival. Continuity is a cornerstone of the strategy. The continuity of the role and its interaction with the event and the ability to employ multiple alternatives are what qualify the state to describe its politics. The external strategy has evolved into. In order to answer this question, we need to examine the elements and pillars that guarantee its steadfastness and survival
The research aims to measure the impact of knowledge management processes individually and in total in the innovative marketing.
We depart search of a problem expressed in a number of intellectual and practical questions, the application of this research in the General Company for Vegetable Oil Industry, represented composed a sample of (63) (Director General and Deputy Director General and Director of the Department and the Division) in the company researched, it has been designed measuring instrument to collect the necessary data either statistical means they are the percentage and the arithmetic mean and standard deviation and coefficient of variation and the coefficient of simple correlation and model
... Show MoreThe research aims to demonstrate the impact of internal audit in Iraqi economic units on enhancing social performance reports, through the statistical models used, as a survey list (for the independent variant) of the search, which contains five axes of each axis, contains a set of The questions were prepared on the basis of the standards issued by the Institute of Internal Auditors (IIA) and were distributed to a sample of internal auditors, as for (for the approved variable) the researcher obtained numerical data represented by the financial statements of the research sample and used statistical models such as model (Kolmakrov-Smirnov) is a good match (goodness of fit) which assumes that the data is distributed naturally as wel
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreSoil pH is one of the main factors to consider before undertaking any agricultural operation. Methods for measuring soil pH vary, but all traditional methods require time, effort, and expertise. This study aimed to determine, predict, and map the spatial distribution of soil pH based on data taken from 50 sites using the Kriging geostatistical tool in ArcGIS as a first step. In the second step, the Support Vector Machines (SVM) machine learning algorithm was used to predict the soil pH based on the CIE-L*a*b values taken from the optical fiber sensor. The standard deviation of the soil pH values was 0.42, which indicates a more reliable measurement and the data distribution is normal.
In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreTürklerin İslam dini ve kültürünü benimsedikten sonra,Anadolu'da Arap ve özellikle Fars Edebiyatlarını örnek alarak oluşturdukları yazılı edebiyattır. Bu dönemin şairleri(ozanları) şiirlerini divan adı verilen kitaplarda topladıkları için söz konusu edebiyata da Divan Edebiyatı denilmiştir.Özellikle,medreseden yetişen aydın sanatçı ve yazarların saray ve çevresinde oluşturdukları bir edebiyat geleneği olduğu için, Havas(Yüksek Zümre) edebiyatı,Saray edebiyatı, Klasik Türk edebiyatı gibi adlarla da anılmaktadır.Divan edebiyatı sözünün 1900'den sonra ortaya çıktığı sanılmakta ve ilk defa kimin kullandığı bilinmemektedir.
Abstract:
The aim of the research is to highlight the role of electronic human resources management practices in the sustainability of knowledge capital as one of its success factors, as well as the diagnosis and interpretation of the relationship between research variables and their dimensions. The research problem is that the University of Babil implements some electronic human resources management practices not in a complete way, The level of its application and the problems it faces, as well as the extent to which these practices reflect the knowledge capital and sustainability in the university, and highlights the importance of research as it is concerned with the electronic aspects and achieve the competitive advant
... Show MoreThis study aims to study the inherited occupations which are considered to be a cultural, civilized and social legacy that effected by the Prevailing social and economic circumstances in the Iraqi society .
The study aimed to achieve several goals, including:
Identify the relationship between the urbanization and inherited occupations in the old city Al-Karkh.
Identify the relationship between the ecological construction and inherited occupations in the old city Al-Karkh.
Recognize the factors and motives inherited occupations in the study area .Identify the role of inherited occupations in promoting opportunities cohesion of the family system in the study area.
The field of the study had concentrated on a sample of famili
Massive multiple-input multiple-output (m-MIMO) is considered as an essential technique to meet the high data rate requirements of future sixth generation (6G) wireless communications networks. The vast majority of m-MIMO research has assumed that the channels are uncorrelated. However, this assumption seems highly idealistic. Therefore, this study investigates the m-MIMO performance when the channels are correlated and the base station employs different antenna array topologies, namely the uniform linear array (ULA) and uniform rectangular array (URA). In addition, this study develops analyses of the mean square error (MSE) and the regularized zero-forcing (RZF) precoder under imperfect channel state information (CSI) and a realist
... Show MoreThe concept of environmental debt, which has several dimensions, emerged in the nineties. One of these dimensions is spatial, referring to the debts that southern countries sustain due to the extraction of natural resources and environmental damage inflicted upon northern countries. Another dimension, the temporal dimension, concerns the environmental debts that current generations owe to their predecessors. That means past generations are culpable for overuse of natural resources and mismanagement. The debt issue is complex, despite many mechanisms to resolve it. Most important are the recently introduced environmental bonds, an important step forward in the field of sustainable financing of environmental debts.