Preferred Language
Articles
/
jmracpc-6
TIME MANAGEMENT AND WORK PRESSURE AND THEIR RELATIONSHIP TO ADMINISTRATIVE LEADERSHIP/ A CASE STUDY AT THE HIGHER INSTITUTE FOR ADMINISTRATIVE DEVELOPMENT OF SECURITY AND ADMINISRATIVE: TIME MANAGEMENT AND WORK PRESSURE AND THEIR RELATIONSHIP TO ADMINISTRATIVE LEADERSHIP/ A CASE STUDY AT THE HIGHER INSTITUTE FOR ADMINISTRATIVE DEVELOPMENT OF SECURITY AND ADMINISRATIVE
...Show More Authors

The research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of the administrative and clear in his work to receive it ambiguity in the roles Except Exclusive entrusted to him, which contributed to achieving the basic goals of the organization in which it operates, and recommended the researcher: the establishment of multi-tasking administrative leadership in the administrative organization of training courses at the Higher Institute of security and administrative development. The leader of the administrative and clear in his work to receive it ambiguity in the administrative roles assigned to it, contributing to the achievement of the basic goals of the organization in which it operates, the need for attention to the organization of time and administrative leadership because time is an important resource should be exploited in assisted to complete its work within the timings required from him.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Normalize and De-Normalize of Relative Permeability Data for Mishrif Formation in WQ1: An Experimental Work
...Show More Authors

In many oil-recovery systems, relative permeabilities (kr) are essential flow factors that affect fluid dispersion and output from petroleum resources. Traditionally, taking rock samples from the reservoir and performing suitable laboratory studies is required to get these crucial reservoir properties. Despite the fact that kr is a function of fluid saturation, it is now well established that pore shape and distribution, absolute permeability, wettability, interfacial tension (IFT), and saturation history all influence kr values. These rock/fluid characteristics vary greatly from one reservoir region to the next, and it would be impossible to make kr measurements in all of them. The unsteady-state approach was used to calculate the relat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 12 2023
Journal Name
مجلة السياسية والدولية /
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte

... Show More
View Publication
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jul 02 2022
Journal Name
Journal Of Positive School Psychology
Morphological structures and their significance for the triple verb " The abstract and more in the Diwan of Al Yassin
...Show More Authors

Verbs are an important material in the construction of the sentence, as they are among the requirements of every sophisticated language, and in this regard, Ibn Al-Gothic (d. 367 AH): “Know that verbs are the origins of the buildings of most speech, and thus scholars called them buildings.” Verbs are the source of expression of the speakers’ ideas to represent the element of activity and movement, and with their knowledge We infer the meanings of Arabic words, and Ibn Al-Sarraj (d. 316 AH) defined it: “The verb denotes a meaning and a time, and that time is either past, present, or future.” Its letters are original and does not drop from its construction a letter in the conjugation of its conjugations, and it is in Arabic two type

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 13 2022
Journal Name
International Journal Of Health Sciences
Iraqi EFL teachers, supervisors and students’ perception of CLT principles and practices at Iraqi schools: A study of its benefits, snags, and future directions
...Show More Authors

Even though in recent decades a bulk of studies have been accomplished on the use of communicative language teaching (CLT) in English as a foreign language (EFL) environments, fairly a limited numbers of studies precisely dealt with investigating the attitudes of language teachers, students and supervisors concerning the principals of CLT in the context of Iraq. Henceforth, this study was designed to delve into the attitudes of teachers, learners and supervisors about the implementation. To this end, the study was accomplished using a mixed method design. The present study was carried out in two phases: designing and using a questionnaire plus interviewing the teachers, students and supervisors (51 language learners, 41 teachers and

... Show More
View Publication
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Distortion And Its Relationship of Parenting Reinforcement For Kindergarten Children
...Show More Authors

This research aims to identify the cognitive distortion of kindergarten children and its relationship to their parenting reinforcement. The researcher used the descriptive approach, being the closest to reaching the study objectives, To measure the relationship between the research variables, the researcher prepared two questionnaire tools for this purpose, the first for measuring "cognitive distortion", And the second is to measure "parental reinforcement", and each tool consisted of (20) items.                         

After ensuring the validity and reliability of the two research tools and their suitabi

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cost Management of construction industries according to the fast-track method
...Show More Authors

Construction projects have become a changing dramatically in recent decades and that the goal of the beneficiaries of the implementation of structural project is to complete the work with less time and within the cost of the specific and the best possible quality may sometimes happen that highlights the importance of time on the rest of the items at the implementation of projects for various reasons, including the need to use the project as soon as possible possible change rapidly to customer's requests, but the high cost of the project represents the biggest obstacle for entrepreneurs with its effects on the quality and the time workers, and is a measure of those elements in monetary terms is the key to integration between them, so the

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 02 2025
Journal Name
مجلة كلية القانون للعلوم القانونية والسياسية
Employment of Chinese Cyber Power in Regional Conflict Management Strategies The Case of Conflict with Japan After 2014
...Show More Authors

Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un

... Show More
View Publication
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Structural and contextual dimensions For the connection of static T feminization An analytical study
...Show More Authors

After looking at the books of the first two grammarians, may God have mercy on them and reward them for what they have provided us with the rules of service to the Book of God and service to Arabic, we must highlight some of the things that the grammarians wanted to clarify, which did not come out of what they proved, but we are working on the statement of the issuance of the passport Provisions from the syntactic industry, and whether it is intended to prove a rule is not very added to the statement of speech, and we know that language, any language was the function of understanding; therefore they said: (speech is a useful word that indicates the benefit improves silence on them), and this concept between Grammatical controls and conte

... Show More
View Publication Preview PDF