The research has deal with the relationship between organizational justice and empowerment and their impact on the achievement of organizational commitment in the office of Labour and Vocational Training. To study the research problem which is represented a sense that employees with low levels of organizational justice and empowerment and the reflection on the organizational commitment of the employees, so that Has been collecting data and information relating to research by designing a questionnaire, were distributed to a sample of (50) people in the office mentioned, and the results of the study to confirm the research hypotheses. and the key results of the research was the presence of correlation relationships and the effect of the research variables, either the most important proposals was the need for the attention of officials in the organization discussed in the achievement levels of organizational justice associated with the empowerment of employees and which are reflected on the organizational commitment
Many researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc
... Show MoreMany cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreIn this paper, we introduce the concept of Jordan –algebra, special Jordan –algebra and triple –homomorphisms. We also introduce Bi - –derivations and Annihilator of Jordan algebra. Finally, we study the triple –homomorphisms and Bi - –derivations on Jordan algebra.
An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreSpeech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R
... Show MoreIn this paper an accurate Indian handwritten digits recognition system is
proposed. The system used three proposed method for extracting the most effecting
features to represent the characteristic of each digit. Discrete Wavelet Transform
(DWT) at level one and Fast Cosine Transform (FCT) is used for features extraction
from the thinned image. Besides that, the system used a standard database which is
ADBase database for evaluation. The extracted features were classified with KNearest
Neighbor (KNN) classifier based on cityblock distance function and the
experimental results show that the proposed system achieved 98.2% recognition
rate.
The study of cultural identity and its data in the designer’s work is considered a cultural nature to highlight the cultural identity and link it to the national culture of their country and society. It provides a reflection and translation of the society’s culture, traditions, social and economic dimensions, the natural environment, and scientific phenomena. Within meanings translated into a variety of methods, including expressive and realistic, which defines the designer’s relationship with his society and the national culture of his country and his connection with the civilization of the country.
The research problem came with the following question: What are the data of cultural identity in the work of designer David Gent
The aims of this research are : 1. To measure mental health among disabled in Baghdad. 2. To identify the statistical differences in mental health among disabled in Baghdad according to gender. 3. To identify the statistical differences in mental health among disabled in Baghdad according to age. The scale of mental health (Aljbori&abdulhussin,2015) was adopted by the researcher, A purposely sample were selected of (60) disabled at Iraqi Alliance of Disabilitiv (IAD) in academic year 2015 to 2016. Where data have analyzed by SPSS. The results found. 1. The disabled characterized with good level of mental heath. 2. There was no significant differences between ganders 3. There are no significant differences between age. Results and rec
... Show More