Preferred Language
Articles
/
jperc-556
الخرائط المعرفية ( دراسة نظرية )
...Show More Authors

Cognitive mapping in humans is the process of coding, storing, and processing information that. Can be used in special behavior . Several scientific Domains interfere in the concept of cognitive maps including cognitive Psychology and environmental Psychology. Three papers at the start of the last century introduced the concept of cognitive maps ,  ( Gulliverʼs  ,1908 ) brief note mentioned such maps in the context of teaching children orientation and there was a paper published by                ( Hutorowicz , 1911 ) comprising an abridged translation of a monograph written by ( B .F .Adler ) on the ( maps of primitive peoples ) and that was followed shortly after by ( Trowbridgeʼs ,1913 ) article on " Imaginary maps" which provided the first clues to the structure of cognitive maps . Edward chace Tolman who used and developed the concept of cognitive maps in his article (Cognitive maps in Rats and man ,Tolman ,1948 ) . The feature of a cognitive map, according to Tolman, is the ability to make novel short – cut between two points. The concept of cognitive map has elicited considerable interest over the years. Tolmanʼs results seem to imply that animals or humans go beyond the information given when they go directly to a goal after having learned an indirect path. This study has several conclusions, and the most important one is that some modifications broadened   the range of cognitive maps that let it to be applied to several fields, including Psychology, anthropology, organizational management, education and political science.                                                                         

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Unque Necklace ; ( Al – Iqd Al – Farid) ; A Reading in the Light of Speech Acts Theory
...Show More Authors

Summed up the idea of this research in an attempt to find the establishment of the knowledge convergence to show the features of verbal acts that occurred a prime location in the lesson deliberative theory book unique contract ( IbnAbdRabbaAndalusian ) to prove that Arabic was the old literary studies included many of the features of this theory in both theoretical and practical

View Publication Preview PDF
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
Figurative theory (Gestalt) and its applications in Iraqi musical templates
...Show More Authors

The musical templates are the fundamental reason for admiration and interest among a lot of cultural and societal medias because of the beauty of it's melodic value, where a lot of Iraqi singing and music specialists and composers try to consolidate daily life idea and translate it into music in a manner that preserve the template and rhythm horizontally and vertically, through the involvement of the scientific and philosophical concepts and theories of modern thought to reach the recipient,, as is the theory of form (Gestalt), one of the most important theories that stretched to their interpretations to the field in general art and in music science, especially, as an area that can be manifested as partial components template music, conn

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 24 2018
Journal Name
Journal Of Planner And Development
التحليل التركيبي للبنية الحضرية باستخدام نظرية تركيب الفضاء
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Modrating Role of Dynamic Knowledge capabilies in Addressing Organizational Failures to Achieve Business Competitiveness: Applied Research in Dairy Industries
...Show More Authors

Purpose/ to build clear perceptions about the level of the effects of organizational failures on the competitiveness of dairy factories and the role of dynamic knowledge capabilities in minimizing these impacts

Mythology/ Design approach Use deduction approach, the research was conducted in four dairy factories in Baghdad (Abu Ghraib, Agriculture, Halal and Ayon Al-Rafidain). It was applied to a sample of (155) individuals representing a sample of the research community from factory owners, managers, Engineers, technicians and experienced workers in the dairy industry. The questionnaire was used as a main tool for collecting data, information and statistical tools in the extraction, testing and analysis o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The added value of the knowledge assets using a scale (VAIC) in a sample of the industrial sector companies
...Show More Authors

The sustainable competitive advantage for organizations is one of the requirements for value creation, which centered on the possession of scarce resources that achieve maximum flows to invest in intellectual capital, if what has been interest in them, measured and employed the way properly and style, so I figured the need for new technologies to enable organizations to measure the intellectual and physical assets and to assess its performance accordingly, so it sheds search light on the measurement of the added value of existing knowledge using the standard value-added factor is the intellectual (value added intellectual coefficient) (VAIC) and to develop a set of assumptions about the extent of the difference between the sample

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Leader-member Exchange Theory in Strengthening Job Satisfaction (Analytical study of the asiacell telecommunications company)
...Show More Authors

The research aims to formulate a model for research on the dimensions of the Leader-member exchange theory according to the ideas and thoughts of Liden /Maslyn, Hammer and impact on job satisfaction and measure these dimensions at asiacell communications to identify the extent of convergence between theoretical dimensions share leader – member Exchange (LMX) with leadership style used in this company, we have been building scale contains two variables, independent variable Leader-member exchange theory five dimensions (effect , Loyalty, contribution, respect professional, and support) the certified job satisfaction variable dimensions (job security, The Style of management, organizational climate, appreciation, and work itself)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
الممارسات القيادية لرؤساء أقسام الهيئة العامة للضرائب في ظل نظرية شبكة القيادة الإدارية: دراسة تطبيقية في الهيئة العامة للضرائب
...Show More Authors

The aim of this study is know the five leadership practices according to the theory of network of leadership by Black and Mouton for the presidents of the Taxation General Board from their prospective, that is through answering the questionnaire questions. To achieving the objectives of this study, the researcher organized a questionnaire form as a main instrument for data collection. It includes (30) items distributed into five leadership practices according to the theory of network of leadership. Each one is subdivided into (6) questions.

The questionnaire was distributed to the presidents of the Taxation General Board of (14). The researcher used the SPSS program to analyses the answers. Through the answers, h

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Equity financing within the framework the signal theory and its reflection on prices of stocks avarege: an empirical study in the Iraq stock exchange
...Show More Authors

 Since there is no market for bond issuance by companies in the Iraqi market and the difficulty of borrowing, companies must resort to proprietary financing to finance their investments. However, in the framework of the literature of financial management, the type of financing used by the company sends signals to investors and therefore reflected on the market value. Therefore, the problem of the study revolves around the variables of the study (Equity financing within the framework the signal theory, price of common stock in the Iraqi market).     

The study aims to verify the impact of the capital increase through the issuance of new stock on the price of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Use of Social Media Networks (SMNs) in Knowledge Sharing, by Using Social Cognitive Theory (SCT) A Study Conducted in Some of Iraqi Universities
...Show More Authors

   SMNs like Facebook, YouTube, Twitter, WhatsApp,..etc. are among the most popular sites on the Internet. These sites can provide a powerful means of sharing, organizing, finding information and knowledge. The popularity of these sites provides an opportunity to measure the use them in knowledge sharing, which needs a special scale, but unfortunately, there is no special scale for that. Thus, this study supposes to use SCT as a scale to measure the use of SMNs in electronic knowledge sharing due to it has been used to measure knowledge sharing with its traditional form. This study can help the decision-makers to use these SMNs to share the academics’ knowledge in educational institutes to the communi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref