Preferred Language
Articles
/
jeasiq-992
The impact of market orientation and the commitment of employees to performance
...Show More Authors

أستهدفت الدراسة اختبار أثر التوجه السوقي والتزام العاملين على أداء المنظمة المسوقة لخدمات النقل الجوي. حيث تم اختيار شركة الخطوط الجوية الملكية الأردنية كمجال تطبيقي.وقد اعتمدت الدراسة في قياس المتغيرات على مقاييس مختبرة وقد تأكد صحتها وثباتها لقياس المتغيرات في البيئة الحالية.  وقد بينت نتائج التحليل الإحصائي الذي استخدمت فيه أساليب إحصائية مختلفة بالاستعانة ببرنامج SPSS)) نتائج مهمة، وفي مقدمتها ارتفاع مستوى التوجه بالزبائن، وجود توجه ملحوظ للشركة بالمنافسين، اهتمام غير كافي لأدارة الشركة في تحقيق التنسيق والتكامل بين الأقسام  المختلفة للشركة، وجود التزام مقبول نسبيا للعاملين تجاه الشركة، وان الشركة لم تحقق تفوق عالي في اداءها قياسا بالمنافسين. وقد أكدت نتائج الدراسة أيضا وجود أثر موجب دال إحصائيا للتوجه السوقي  على التزام العاملين وأداء الشركة ولكل من الحصة السوقية والربحية اضافة الى تأكيد الدراسة ايضا وجود أثر موجب ذو دلالة احصائية لألتزام العاملين على اداء الشركة والمتمثل بكل من الربحية والحصة السوقية. وقد خلصت الدراسة إلي بعض الاستنتاجات والتوصيات لإدارة الشركة لتطوير ادائها.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Modern Mathematical Sciences
Coupled Laplace-Decomposition Method for Solving Klein- Gordon Equation
...Show More Authors

In this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.

Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modules with Chain Conditions on S-Closed Submodules
...Show More Authors

  Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called  s- closed submodule denoted by  D ≤sc W, if D has   no  proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In  this  paper,  we study  modules which satisfies  the ascending chain  conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy Wavenet (FWN) classifier for medical images
...Show More Authors

 

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.

  In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.

&n

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Wed Oct 10 2018
Journal Name
Al-kindy College Medical Journal
Recurrent Laryngeal Nerve Injury With Versus Without Nerve Identification In Different Thyroidectomy Procedures
...Show More Authors

Background: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.

Type of the study: cross –sectional study.

Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
An Investigation into Heat Transfer Enhancement by Using Oscillating Fins
...Show More Authors

The present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Couniform Modules
...Show More Authors

In this paper, we introduce and study a new concept named couniform modules, which is a dual notion of uniform modules, where an R-module M is said to be couniform if every proper submodule N of M is either zero or there exists a proper submodule N1 of N such that is small submodule of Also many relationships are given between this class of modules and other related classes of modules. Finally, we consider the hereditary property between R-module M and R-module R in case M is couniform.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On e-Small Submodules
...Show More Authors

Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.

View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes

Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref