The Innovation Of Knowledge Is An Important And A Key Element In The Progress And Business Excellence Organizations, Therefore Requires Several Elements To Help Create And Implement And Move The Innovation Process Of Knowledge, Including The Strategic Empowerment Associated With The Element Of The Process Of Strategic Momentum Engine Driven Wheel Continuous Dynamic Innovation, And Focused Research Problem By Measuring The Availability Of Strategic Empowerment When Individuals From By Senior Departments And Ways To Help Organizations To Provide Empowerment Commensurate With The Requirements Of Achieving The Goals Of Time And Place Appropriate For The Individual, And The Importance Of Research Stems From The Importance Of The Variables And The Possibility Of Providing An Element Helps To Feature Competition And Lead A The Market Between Organizations, Research And Seeks To Draw Attention To The Empowerment Of This Element Important Strategic Personnel For Individuals Among The Factors Contributing To The Process Of Strategic Momentum Catalyst For The Strategic Plan As A Whole, And Began Research Hypotheses Main Points To Explore The Impact Of Relationships Between The Main Research Knowledge Creation And Empowerment Of Strategic Variables, And Included Community (103 ), An Expert And An Engineer And Consultant In Three Telecom Companies Iraqi Market Leader (Asiacell And Korek Telecom And Zain Iraq) Of The Total (138) Individuals, And Included Methods Of Data Collection And Note The Corresponding Field And Resolution As Well As The Field Of Presence Researcher, Were Analyzed Data By Statistical Methods Represented Ballosth Arithmetic Mean, Standard Deviation And Coefficient Of Variation And Analysis Of Exploratory And Assertive And Standards Differences Moral Among The Surveyed Companies As A Test Kruskal And Mann-Whitney, The Researcher Reached Several Conclusions Of The Most Important Lack Of Surveyed Companies To Enable Their Members Strategically And Administratively And Aguetsaarham On The Implementation Of The Orders Only, Which Limits The Validity Of The Experiences And Knowledge In The Minds Of Providing Ideas And Contributions To Work On The Progress Of Their Organizations As Well As To Facilitate The Course Of The Strategic And Administrative Implementation, The Most Important Recommendations Was The Need To Confirm Supreme Departments To Enable F Radha In The Strategic Planning Process And Implementation And The Creation Of Appropriate Conditions To Enable Them And As Permitted Suitability For Individuals Strategic Empowerment.
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreA collection of pictures of traditional Kurdish women's national clothing and contemporary clothing was collected. A visit was also made to the city of Sulaymaniyah and the city of Halabja to find out the foundations of traditional clothing for the Kurdish regions and the impact of contemporary fashion on traditional dress. Which represents the culture and regionalism and reflects the picturesque nature of northern Iraq, and in order to complete the study, the parametric measurements of the clothes were analyzed and the graphs of the dress and its accessories were re-drawn to understand and make a comparison between them to study the clear influences and changes and examine the possibility of benefiting from them in sewing contemporary f
... Show MoreSuccessive waves and generations of terrorists attacked the Iraqis in the years following the fall of the regime in Iraq in 2003, after the US invasion of the country under the pretext of weapons of mass destruction. Hence, the Iraqi people enrolled in ongoing war with these armed groups which led to massive casualties due to blasts and missile injuries.
Mechanism of blasts injury can be classified into primary, secondary, tertiary, and quaternary. While bullet injuries can be classified into low and high-energy injuries, the type and severity of the injury will influence the type of management, together with facilities available in
This study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreThe research aims to evaluate the direct deduction department’s procedures for the process of collecting income tax using the direct deduction method for state departments and the public sector in light of direct deduction tax instructions No. (1) of 2007 and Income Tax Law No. (113) of 1982 (amended) through Giving a clear idea of the reality of tax collection procedures because this type of tax is one of great importance because it contributes to the provision of financial revenues to the state to finance its expenses and direct the economy towards achieving its social, economic and political goals. The researcher makes comparisons between the procedures of the General Tax Authority in collecting the tax and what was approved b
... Show MoreThe research aims to apply one of the techniques of management accounting, which is the Quality Function Deployment(QFD) on the Pepsi product in Baghdad Soft Drinks Company and to determine the technical requirements objectively that have been applied in practice in Baghdad Soft Drinks Company / a private shareholding company, as it focuses on meeting the quality requirements and achieving positive quality to provide a product It meets the requirements of current and future customers, hence the importance of research that indicates that the Quality Function Deployment(QFD) is a useful tool to develop the requirements of new products, being a design process driven by customers through their voices, and thus contribute to achieve a competi
... Show MoreSome of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More