دور مكننة المعلومات المحاسبي في اتخاذ القرارات
The research aims to diagnose the level of relationship and effect of the decision cycle (OODA) principles on strategic agility, aware of the importance of the subject itself as one of the modern themes which were writings around it somewhat limited, as well as pursuing to study it in a field which the nature of its activities requires the a necessary link between the decision cycle principles and strategic agility, the health institutions was the best, (Medical city, Al Yarmouk) both hospitals were selected as a society for research, and doctors working in emergency departments was as a sample, included (26) doctor from the first hospital, and (27) doctor from the Second, total sample was (53) doctor, by applying a number of descriptive st
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show Moreبهذا البحث نقارن معاييرالمعلومات التقليدية (AIC , SIC, HQ , FPE ) مع معيارمعلومات الانحراف المحور (MDIC) المستعملة لتحديد رتبة انموذج الانحدارالذاتي (AR) للعملية التي تولد البيانات,باستعمال المحاكاة وذلك بتوليد بيانات من عدة نماذج للأنحدارالذاتي,عندما خضوع حد الخطأ للتوزيع الطبيعي بقيم مختلفة لمعلماته
... Show MoreAbstract
The purpose of the present paper is to light on the relationship between jobs design, analysis and its reflections on reinforcing workers' vocational adjustment. The present paper aims to accomplish cognitive and applied goals, top of which, test of functional analysis ability to have effect upon workers' vocational adjustment via job design directly and indirectly owning to the virtual factor practiced by these practices on the sought organization. The problem of the present paper comes with many, the most important is the of how to bolster and back up worker's technical adjustment through good and accurate design for the job.
Based on this problem and goals as to expla
... Show Moreه رثا قيقحتلو ،ةيبساحملا تامولعملا ةميق ةمئلام يف قيقدتلا ةنجلل ةيبساحملاو ةيلاملا ةربخلاو ةيللاقتسلاا ثحبلا تايضرف رابتخلا ةمزلالا تانايبلا عمجل ةنابتسا ةرامتسا مادختساب ةثحابلا تماق ةساردلا فده ةللاد وذ رثأ دجوي(يهو ةيبساحملاو ةيلاملا ةربخلل ةيئاصحإ ةللاد وذ رثا دجوي( ، )ةيبساحملا تامولعملا ةميق ةمئلام ىلع قيقدتلا ةنجل ةيللاقتسلا ةيئاصحا )ةيبساحملا تامولعملا ةميق ةمئلام ىلع ( نم تنوكت ةنيع ىلع تعزو ث
... Show Moreيكتسب موضوع تدريب وتطوير العاملين أهمية بالغة في الظروف الاقتصادية الحالية التي تسودها مفاهيم وتوجهات جديدة كعولمة الاقتصاد ورأس المال المعرفي والفكري، وحيث صارت المعارف والمهارات والقابليات التي يمتلكها العاملون محركاً أساسياً باتجاه النجاح، وعنصراً مهماً في زيادة فاعلية منشأة الأعمال، وإدامة وجودها واستمرارها.
إن العاملين المدربين بشكل جيد على عمليات المنشأة وطبيعة المواد التي تستخدمها وإنتاجه
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe information revolution، the new language has become one for all the peoples of the world through handling and exchange and to participate in all key areas (economic، cultural and scientific) and Accounting episode of this revolution has turned most of the traditional systems (manual) in companies to automated systems، this transformation in the regulations summoned from the auditors that develops their traditional examination automated systems so had to provide tools for auditing help auditors to keep abreast of developments and as a result there is no evidence checksum Local Private audited automated systems came search to provide evidence helps auditors for guidance as part of COBIT، which provides audit procedures Detailed inf
... Show MoreAnhdralazuri of Yazour a village Ramle Palestine, from a religious family of Abu Mohammed Yazouri arrived in Egypt in the year (439 AH / 1036 AD), and was aimed from behind, returned him to his previous position to assume spend Ramle, Fasttaa a senior statesmen to provide Abu Muhammad Yazouri L. Caliph assuming start, Vtm him so, raising its standing and became MetwallyDiwan or caliph, in the year (441 AH / 1049 AD) was assigned the Chief Justice did not stop at that, but the era of his post of the ministry a year (442 AH / 1051 AD), having proven merit in every Matulah, The minister Yazouri of the powerful minister aspiring and employers pens won several titles did not collect it for one by the judiciary, advocacy and ministry granted C
... Show More