Each organization has values and objectives, tangible and intangible properties of its products. The reflection of properties on the brand constitutes the identity of the brand that contributes to building the customer's convictions about the products or services provided by any organization and its brand in a positive or negative way. This is reflected in purchasing behavior, which may push forward the progress towards marketing goals or deviation from them. Therefore, the current research came to identify the brand identity, its types and the factors affecting them and how they affect to achieve each of the marketing goals. At a time when the number of brands and varied identities and similar to many times, aking the researcher from the basic research problem of asking how the identity of the mark can contribute to the achievement of marketing goals? In order to identify any marketing objective that contributes to the identity of the mark to achieve more than the other goals, according to the main research hypothesis, "the identity of the brand has a significant impact on the achievement of marketing goals." The managers of the global smart card company in Iraq were chosen 203 managers of the research community and 86 of them were selected for practical applications to test the hypothesis using statistical methods, including the means and standard deviation to measure the homogeneity of the answers to the questions and the simple linear regression test to measure the degree of influence between Variables. The research found that there is a relationship of influence of the brand identity in achieving the marketing objectives. The stronger influence of the brand identity on building customer relations while profit growth was the weakest relationship. The researcher recommended that the company need to formulate clear profit growth policies and inform employees of the profit growth rates to be achieved. It is not necessarily a growth in profits. It is not necessarily a growth in profits. It is an important element in the sustainability of its success.
This study reported activity concentration of 238 U, 232 Th, 40 K in 50 soil samples AL-Nada district - Najaf Governorate - Iraq Measurement using gamma ray spectrometer NaI (TI) (3x3). The activity concentrations of natural radionuclides are found to range from (31.319 Bq.Kg-1 to (1.1583 ± 0.0821) Bq.Kg-1with average (11.851 0.281) Bq.Kg-1 of uranium 238U. From (1.117±0.048) Bq.Kg-1 to (23.948 ) Bq.Kg-1 with an average of (6.283 0.148 ( Bq.Kg-1 for thorium 232Th,.from(13.592±0.282) Bq.Kg-1 to (705.834 6.179) Bq.Kg-1 and average (265.494 1.445) Bq.Kg-1 potassium40K , equivalent radium from (12.489 0.328) Bq.Kg-1 to (84.199 1.911) Bq.Kg-
... Show MoreGenetic polymorphism in a fragment of NADH (ND4),400bp long from the Mitochondrial DNA
(mtDNA) of Mediterranean fruit fly ceratitis capitata (Wiedemann, 1824) using PCR-RFLP method
with the restriction enzyme EcoRV in samples collected from three governorates in the middle of Iraq.
The purposes of this study is to establish database, discover the introduction source as well as studying
the genetic diversity for this economic pest in Iraq. The results show that there is a genetic
polymorphism of the studied gene fragment among Kut governorate as compaired with the other
studied samples according to digestion results of the restriction enzyme EcoRV.
This study takes its importance in the area of systemic and historical
studies because it stands on presenting such aspects from the systematic
respect and now Ibn AL-Jouzy dealt with the text of this subject and how he
was exact in telling them.
Therefore, this study sheds light on the important aspects of this
method in his book through reading and studying such texts whether they had
direct or indirect relationship with this subject.
This study is not an easy task since it is based on contriving the
intellectual aspects in the methods of lbn AL-Jouzy and how he deals with the
text of this subject in its hygienic, natural and geographical aspects in
constructing a historical method in most scripts, the gen
The aim of this research to study.
The dimensions of organizational learning have been defined(learning dynamics, individuals empowerment, knowledge management and technology application) as well as the dimensions of learning organization have been defined (culture values, knowledge transfer, communication and employee characteristics), Asset completion questionnaire was used to collect data of this research from a purposely sample represent forty employees who works in Iraqi Planning Ministry at different positions. The research divided to four parts :
The first to the research methodology, the second to the theoretical review o
... Show MorePraise be to God, Lord of the worlds, and the outcome is for the righteous, and prayers and peace be upon the author of the clear communication, to whom was revealed the saying of the Lord of the worlds (And We have sent down to you the message that you may make clear to the people what has been sent down to them, and that they may reflect.)
His family, companions and followers, as for what follows:
Among the Qur’anic studies related to Islamic matters, ancient and modern, (the clear and similar in the Holy Qur’an), and due to the importance of the topic, we found the attention of scholars to it.
With many studies and research on it, and their efforts in overcoming its major obstacles, you will not find a scho
... Show MoreThis study aimed to show the extent of compliance with the income taxpayer to provide tax returns and increase the speed of collection of these taxes in addition to increasing confidence in Income Tax department and reduce the number of cases transferred to the courts and promote taxpayer awareness in charge of the importance of self-assessment system, and study sought to investigate the effect of the existence of records documents, technical audit, and computational audit and documentary audit on income tax collections in Jordan, from the point of viewof Jordanian income tax auditors ,results shows there's a strong relation between these variables and Income Tax collections.
Computer models are used in the study of electrocardiography to provide insight into physiological phenomena that are difficult to measure in the lab or in a clinical environment.
The electrocardiogram is an important tool for the clinician in that it changes characteristically in a number of pathological conditions. Many illnesses can be detected by this measurement. By simulating the electrical activity of the heart one obtains a quantitative relationship between the electrocardiogram and different anomalies.
Because of the inhomogeneous fibrous structure of the heart and the irregular geometries of the body, finite element method is used for studying the electrical properties of the heart.
This work describes t
... Show More500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More