The research has deal with the relationship between organizational justice and empowerment and their impact on the achievement of organizational commitment in the office of Labour and Vocational Training. To study the research problem which is represented a sense that employees with low levels of organizational justice and empowerment and the reflection on the organizational commitment of the employees, so that Has been collecting data and information relating to research by designing a questionnaire, were distributed to a sample of (50) people in the office mentioned, and the results of the study to confirm the research hypotheses. and the key results of the research was the presence of correlation relationships and the effect of the research variables, either the most important proposals was the need for the attention of officials in the organization discussed in the achievement levels of organizational justice associated with the empowerment of employees and which are reflected on the organizational commitment
The research aims to shed light on the impact of the application of the electronic services system on electronic banking activities in a sample of Iraqi banks, as investment in technology is the most important factor for the success and future growth of administrative companies in general, and banking in particular, as global economic developments in the field of Technology has led the majority of banking sectors in the world to undergo deep reforms and radical changes in the entity of their systems and mechanisms to confront competition and keep pace with economic changes, as the concept of banking services and its diversity changed with it, especially since persistence in the traditional approach no longer gi
... Show MoreThe concept of poetics has different dimensions, part of which is related to the creative achievement, and part is related to the critical perspective.
The concept of poetics has different dimensions, part of which is related to the creative achievement, and part is related to the critical perspective. The task of this research
Excessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M
... Show MoreIn the present paper, the features of democratization of vocabulary in the language of mass media are tackled. Particularly, the functions of this phenomenon in the context of language as an ontological reality are analysed. As well, the growing role of the language of the media, and the language of politics as an integral part pertaining to it, is noted. Further, attention is paid to the excessive saturation of the language of the media along with the literary language, by means of evaluation which may include negative results.
In this concern, scholars had different views, specifically in relation to the use of colloquial vocabulary along with some vernacular profess
... Show MoreThis study has sought to explore the Yemeni online news websites’ treatment of the tropical storm “Luban” which hit the coasts of al-Mahra governorate, and other parts of the Yemeni Eastern and Southern governorates in October 2018. The study also examined how the Yemeni news websites covered the disaster on the basis of the problematic situation model. The study’s findings revealed a form of logical balance in distributing the coverage of the disaster in its different phases. The coverage was a bit more focused on the disaster phase than the pre- and post-disaster phases. Additionally, the websites paid more attention to precautionary measures and the disaster’s humanitarian and material losses. The findings reveal that the ne
... Show MoreThe present investigation aims to determine the effects of aflatoxin B1 (AFB1) on biotransformation and antioxidant genes and the protective effects of curcumin, present in turmeric (Curcuma longa) powder (TMP). Specifically, the study included four groups of albino mice were fed for 30 days on diet Group I: Control, Group II: animals fed on the conventional basal diet supplemented with 0.5% food grade TMP that supplied 74 mg/kg total curcuminoids. Group III contained animals reared on conventional basal diet supplemented with 1.0 ppm AFB1 supplied by ground aflatoxin culture material (760 ppm AFB1). Finally, Group IV comprised of albino mice fed with basal diet supplemented with 1.0 ppm AFB1 and 0.5% TMP that supplied 74 mg/kg of the
... Show MoreTwo derivatives of Iimidazolidin 4-one (IMID4) and Oxazolidin 5-one (OXAZ5), were investigated as corrosion inhibitors of corrosion carbon steel in sea water by employing the theoretical and experimental methods. The results revealed that they inhibit the corrosion process and their %IE followed the order: IMID4 (89.093%) > OXAZ5 (80.179%). The %IE obtained via theoretical and experimental methods were in a good agreement with each other. The thermodynamic parameters obtained by potentiometric polarization measurements have supported a physical adsorption mechanism which followed Langmuir adsorption isotherm. Quantum mechanical method of Density Functional Theory (DFT) of B3LYP with a level of 6-311++G (2d, 2p) were used to calculate
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show More