The research aims to; identify the management of conflict as perceived by secondary school managers toward the directors of directorates of education in wassat province, identify functional performance as perceived by secondary school managers toward the directors of directorates of education in wassat province. Besides, explore the relationship between Conflict management and functional performance among the directors of directorates of education in wassat province. A descriptive approach deemed more appropriate with study design. As a tool to collect the data of current research, the author used a questionnaire. Spss tools were used for data analysis
Electrocoagulation process was employed for the treatment of river water flows in Iraq. In this study, a batch Electrocoagulation process was used to treat river water taken from Al - Qadisiyah water treatment plant. electrolysis time, voltage and inter-electrode spacing were the most important parameters to study . A statistical model was developed using the RSM model. The optimum condition after studying the parameter effect the process was 1 cm separating, 30 volts . The RSM model shows the ideal condition of removal for both the TSS and turbidity at 1 cm, 20 volts and 55 min.
The current research aims to identify the contributions of small income-generating projects in theempowerment of rural women in Nineveh Governorate ,Al-Hamdaniya district, as a simplerandom sample was drawn from the research community of 280 respondents , according to theRobert Mason equation at the level of significance 0.05, so the sample size was 162 respondents,i.e. a percentage 58% collected the necessary data using a questionnaire prepared as a basic toolfor data collection consisting of 20 items distributed on two axes ,and the results of the researchwere analyzed and presented using the spss statistical program, as well as manual analysis usingrepetitions, the weighted mean, the standard deviation, and the percentage weight. And the
... Show MoreThe Current Research Seeks To Identify The Possibility Of Unifying The Private Drinking Stations In The Session In A Single Station In Order To Prevent Pollution. In Order To Achieve The Goal Of The Current Research, The Researcher Followed The Descriptive Survey Approach. The Researcher Identified The Research Community As Working In Institutions Related To Drinking Water Filtering In The Governorate Of Baghdad, And In Order To Collect Data And Information Necessary To Answer The Study's Question (Is It Possible To Supply Private Drinking Stations With One Station?) Researcher Designed A Questionnaire Consisting Of (10) Paragraphs Measuring Aspects Of This Topic, And Applied It To A Sample Of Employees And Workers Amounted To (200) People,
... Show MoreFree radicals and oxidative damage caused by them have being suggested to be involved in the pathogenesis of migraine. These may result from distorted equilibrium of pro-oxidant/anti-oxidant system that continuously generates and detoxifies oxidants during normal aerobic metabolism. Escape of such system from equilibrium leads to damage of cellular elements with the depletion of cellular stores of anti-oxidants material such as glutathione and vitamin E. Therefore, free radical scavengers (vitamin E or melatonin) seems to be of potential benefit as prophylactic anti-migraine therapy by neutralizing free radicals overproduction and possibly preventing formation of highly toxic intermediates (such as nitric oxide). In addition of being pow
... Show MoreObjective: The study aim is to identify factors that may contribute to children’s weight status variations. Methodology: A descriptive cross sectional study is carried out has been conducted at the AL- Samawah city in Primary Health Care Centers for the purpose of the screening children’s weight status of Age One to five Years Old. This study is started from December 16th 2018 to February 14th 2019. A(non propriety) purposive sample comprised of (20) primary health centers (10 main and 10 sub) are selected of 500 children who visit the primary health care center during the period for the purpose of the study; Data was collected through using a questionnaire designed and developed for the purpose of the study . It consists of two main
... Show MoreAbstract
The study aims to identify the levels of core competencies dimensions and types of organizational flexibility in the investigated organization, as well as to determine the nature of the relationship and the impact of core competencies dimensions with the process of organizational flexibility. Thus, a number of research questions were presented to express the research problem as follows:
- What is the level of the investigated individuals' awareness to core competencies and organizational flexibility across their dimensions and types in the investigated organization?
- To what extent are core competencies and organizational flexibility available in the Organiz
The study aims to know the role of governance in the consolidation of the principles of business ethics, through the application of the principles of governance and the dimensions of business ethics in the private sector. And knowledge of the validity of the hypothesis key of the current study according to which "increases the ethics of business organizations strength and coherence in the presence of the principles of governance" as it was distributed the questionnaire to a sample of a chairman and board members and managers department and heads of sections in some of the private banks. I have been using correlation analysis and regression testing (t) to see the moral differences and to find out the c
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More