Preferred Language
Articles
/
jeasiq-923
Developing strategic leadership practices in the light of transparency and organizational citizenship behavior - A field study of a sample of the staff of the Office of the Inspector General at the Iraqi Ministry of Culture
...Show More Authors

Diversity the terms and practice the organizational filed with different concepts and environment, which Iraqi environment part from them. Some organizational in Iraqi environment leave its basic oriented to agreement with the leader desire, their fore this research focus tow basic variable (organizational citizenship behavior & transparence), we supposition which is dependent to explanation the response variable (strategic leadership). The results justification in part and not justification in another part. For example the organizational citizenship behavior effect on some parte of the strategic leadership. The transparence have faraway to fly from the relation with organizational citizenship behavior and strategic leadership. We know this variables when we see it as shine for impact on practice of strategic leadership which is not enough. So that we shod be search to define another comprehensive variable or have related we can dependent to supporting public leadership performance level for organizational and put it in the right situation that aim to achievement what they do. In at all there are agreement between leadership and employee not only with emotion and thought but also by direction and purpose that will achieve intentionally.       

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Mon Mar 28 2022
Journal Name
The Open Dentistry Journal
Depression, Anxiety and Stress Among Dentists During COVID-19 Lockdown
...Show More Authors
Introduction:

The objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.

Methods:

A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.

Results and Discussion:

Being unsatisfied with the job was as

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Aug 01 2008
Journal Name
2008 International Symposium On Information Technology
Generating pairwise combinatorial test set using artificial parameters and values
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Water Hammer Arresters; Review Studies and Practical Experiments for Alternatives
...Show More Authors

The current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a number of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 07 2020
Journal Name
International Journal Of Research In Pharmaceutical Sciences
Fifth stage pharmacy students’ knowledge and perceptions about generic medicines
...Show More Authors

The aim of the current study was to evaluate the knowledge and perception of the fifth stage pharmacy students (college of pharmacy/ University of Baghdad /Iraq) regarding generic medicines. This study is a cross-sectional study carried in a college of pharmacy /University of Baghdad during the period from (November 2018- March 2019). The number of students included in the current study was 168 undergraduate stager pharmacists. A questionnaire was used to collect data of the study. Nearly 86% of the students said that they had heard of generic and brand medicines, and pharmacy was the main source of knowledge regarding generic medicines (66.7%).  About (33.3%) of the respondents agreed that generic medicines are bioequivalent to br

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 15 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Building Words Dictionary List Using Symbol Enumeration and Hashing Methodology
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Anterior Loop Presence and Extension Using Cone-Beam Computed Tomography
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 13 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Association between Parental Treatment and Aggressive Behaviors among Adolescent Students
...Show More Authors

Objectives: The study aims at assessing the parental treatment and aggressive behaviors among adolescents and to find out the association between parental treatment and aggressive behavior.       

Methodology: A descriptive correlational design that is initiated for the period of January 1st to July 5th, 2021; The sample of the study includes 220 from the intermediate school male students in schools in the Karkh and Rusafa in Baghdad have ranged in age from (13-15) years, the researcher used the convenient sampling method (non-probability sample) in which the students were selected purposively. Parental Treatment Scal

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Digital Image Watermarking Using Arnold Scrambling and Berkeley Wavelet Transform
...Show More Authors

Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.

View Publication Preview PDF