The study aimed to investigate the relationship between empowerment strategies and their impact on the success of enrichment work, it included the dimensions of empowerment strategies (power, knowledge, information, rewards), The dimensions of Job enrichment are (Skill variety, Task identity, Task significance, Autonomy, Feedback). The study was conducted at the headquarters of the Iraqi Oil Ministry in Baghdad and was based on a sample of the leadership of the ministry of managers consisting of 215 people. The data were collected using the questionnaire method based on scientific standards adopted in previous studies, which were carried out a series of tests to ensure their validity and ability to examine the opinions of the research sample. Descriptive statistical methods (arithmetic media, standard deviations, coefficient of variation, and relative importance) were used to describe and diagnose research variables Pearson correlation was also used to test correlations and (F, R2, β, a) in the hypothesis test. The most important findings of the study that there is an impact of the dimensions of empowerment strategies on organizational innovation, that the model of the study stressed the existence of a correlation and influence between the research variables.
Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreThe increase in economic institutions, commercial companies and international trade operations among them across countries and in most countries of the world and the inadequacy of their national laws and national judiciary to settle the disputes arising from them between the parties led to the tendency of legal thought to search for specialized, appropriate and quick tools to decide on them, so international commercial arbitration came In the first place for the settlement of those disputes, especially those that arose within the framework of international trade relations.
As a result, the demand for arbitration, especially international commercial, has increased, while other problems have emerged with it, namely, deceit of oppon
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More