The main purpose of the research is to diagnose the importance of the role that strategic memory plays with its three variables (content, structure, and processes) in helping the human resource department to use the COSO model with its five components (culture and governance, strategy and objectives, performance, communications and information, and feedback) in auditing activities and tasks Her own. As the research problem emphasized the existence of a lack of cognitive perception, of the importance of strategic memory, and the investment of its components in the rationalization of the application of the COSO model. and therefore it can be emphasized that the importance of the research is to provide treatments for problems related to the variables that have been studied within the research organization. As for the objectives of the research, they are represented by conducting a descriptive analysis of the investigated variables and tests of the relationship between them. To achieve the objectives of the research, use the descriptive-analytical approach. As the questionnaire was built using international indicators and standards, and it was distributed to a sample consisting of (97) members of the staff of Al-Rafidain University College. The researchers relied on some statistical tools available in the statistical program (SPSS-V23) in order to enter and process data, and the results confirmed the validity of the main and sub-research hypotheses. Accordingly, the researchers recommended the necessity of preparing all the requirements necessary to build strategic memory and then employing it in providing the human resources department with information that enables it to apply the COSO model in auditing its activities
Let R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.
The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreThis paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Background: The discriminative power of the classical WHO parameters in relation to male fertility is quite low, because they only address few aspects of sperm quality and function. This has led investigators to focus their attention on the male gamete and in particular its genome.Objective: To explore which of the sperm DNA damage parameters measured by comet assay are more reliable, and their relations with the standard semen parameters.Methods: Study was done on 40 infertile men selected from couples attending the Institute of Embryo Reasearch and Infertility Treatment at Al-Kadhimiya City/ Baghdad in the period between February 2009 and May 2009, with a history of infertility of ≥1 years; and 15 healthy volunteers of proven fertili
... Show MoreAbstract
Research title: The legal ruling of advice.
This research deals with the topic of advice, as the research included the following:
Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.
The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or dislike
... Show MoreThe investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .
&nb
... Show MoreBackground: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti