The main purpose of the research is to diagnose the importance of the role that strategic memory plays with its three variables (content, structure, and processes) in helping the human resource department to use the COSO model with its five components (culture and governance, strategy and objectives, performance, communications and information, and feedback) in auditing activities and tasks Her own. As the research problem emphasized the existence of a lack of cognitive perception, of the importance of strategic memory, and the investment of its components in the rationalization of the application of the COSO model. and therefore it can be emphasized that the importance of the research is to provide treatments for problems related to the variables that have been studied within the research organization. As for the objectives of the research, they are represented by conducting a descriptive analysis of the investigated variables and tests of the relationship between them. To achieve the objectives of the research, use the descriptive-analytical approach. As the questionnaire was built using international indicators and standards, and it was distributed to a sample consisting of (97) members of the staff of Al-Rafidain University College. The researchers relied on some statistical tools available in the statistical program (SPSS-V23) in order to enter and process data, and the results confirmed the validity of the main and sub-research hypotheses. Accordingly, the researchers recommended the necessity of preparing all the requirements necessary to build strategic memory and then employing it in providing the human resources department with information that enables it to apply the COSO model in auditing its activities
Arabic calligraphy is one of the ancient arts rooted in history, And that he grew up conflicting views and writings addressed as a, communication tool for the linguistic The teaching calligraphy note an art and science because it depends on the fixed assets and precise rules in his art because centered Beauty It targets teach Arabic calligraphy speed as the education and recitation helps to write fast Which have great interest in the field of education and in life both Also accompanied Arabic calligraphy and scientific renaissance significant knowledge in the Ara
... Show MoreBack ground: AIDS is considered a dreaded disease.
According to recent estimates, 42 million people suffer
from HIV/AIDS (90% of these being in the developing
countries), with 5 million people newly infected with HIV
and 3.1 million deaths in the year 2002 globally. At
present, there is no effective vaccine to prevent the
disease. Hence, Health education (Information, Education
and Communication) activities bringing about behavioral
changes in the community, promoting healthy sexual
behavior and preventing the risky ones is the best possible
solution to the problem of AIDS.
Objectives: To find out the knowledge, beliefs and
attitudes regarding various aspects of HIV/AIDS amongst
intermediate and sec
Theoretical and experimental investigations have been carried out on developing laminar
combined free and forced convection heat transfer in a vertical concentric annulus with uniformly
heated outer cylinder (constant heat flux) and adiabatic inner cylinder for both aiding and opposing
flows. The theoretical investigation involved a mathematical modeling and numerical solution for
two dimensional, symmetric, simultaneously developing laminar air flows was achieved. The
governing equations of motion (continuity, momentum and energy) are solved by using implicit
finite difference method and the Gauss elimination technique. The theoretical work covers heat flux
range from (200 to 1500) W/m2, Re range from 400 to 2000 an
The research has handled an important service sector in Iraq which is the municipals sector since it is connected directly and closely with the services presented to the citizens, and because the process of accomplishing the projects needs planning and scheduling for implementing these projects according to the available financial allocating and it was no choice but finding modern methods that help succeeding the processes of planning through making use of Geographic Information system (GIS) in providing the necessary information in scheduling the projects since it is considered as one of the tools that conveys the occurred in collecting the huge amount of the locative d
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreTraditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreBackground: Obesity tends to appear in modern societies and constitutes a significant public health problem with an increased risk of cardiovascular diseases.
Objective: This study aims to determine the agreement between actual and perceived body image in the general population.
Methods: A descriptive cross-sectional study design was conducted with a sample size of 300. The data were collected from eight major populated areas of Northern district of Karachi Sindh with a period of six months (10th January 2020 to 21st June 2020). The Figure rating questionnaire scale (FRS) was applied to collect the demographic data and perception about body weight. Body mass index (BMI) used for ass
... Show MoreThe research demonstrates new species of the games by applying separation axioms via sets, where the relationships between the various species that were specified and the strategy of winning and losing to any one of the players, and their relationship with the concepts of separation axioms via sets have been studied.