Preferred Language
Articles
/
jpgiafs-747
الممارسات القيادية لرؤساء أقسام الهيئة العامة للضرائب في ظل نظرية شبكة القيادة الإدارية: دراسة تطبيقية في الهيئة العامة للضرائب
...Show More Authors

The aim of this study is know the five leadership practices according to the theory of network of leadership by Black and Mouton for the presidents of the Taxation General Board from their prospective, that is through answering the questionnaire questions. To achieving the objectives of this study, the researcher organized a questionnaire form as a main instrument for data collection. It includes (30) items distributed into five leadership practices according to the theory of network of leadership. Each one is subdivided into (6) questions.

The questionnaire was distributed to the presidents of the Taxation General Board of (14). The researcher used the SPSS program to analyses the answers. Through the answers, he came to the results that:

  1. (team leadership practice) achieved the highest rate of agreement (% 87) of the study community.
  2. (Mid-way or the mercury leadership practice) achieved the highest rate of agreement (% 80).
  3. (Task manager or diligent leadership practice) achieved the highest rate of agreement (% 77).
  4. (social club leadership practice) achieved the rate of agreement (% 75).
  5. (tolerate of bureaucratic leadership practice) achieved the lowest rate of agreement (% 30).

In the light of the results, the researcher came up to the recommendations, like:

  1. Support the efforts of head of Department in the field of holding training courses for inspectors and assessors, and give the incentives.
  2. Increase the capacities granted to contribute effectively to solve disputes and make settlements.
  3. Work on putting a list to determine the standards of performance for each section to encourage the presidents of departments and the employees to attain on knowing the negative performance for each employee.

Put certain restricts to commission negotiation by the heads of the president of department so that the effective commission could be achieved and in the time.      

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Towards building an educational system free of scientific corruption (Applied study in a sample of colleges of higher education in Iraq within the framework of the government program and the directions of the Supreme Council for Combating Corruption)
...Show More Authors

Nations are developed with education and knowledge that raise the status of society in its various segments, beyond that it leads to underdevelopment and deterioration in various sectors, whether economic, health, social, etc. If we considered the general name of The ministry of Education & Scientific Studies, then the second part seems to be not functioning, since scientific research has no material allocation and remains based on the material potential of the university professor. As for the first half of the topic, the reality of the situation reveals problems related to the Holy Trinity of Education which is (Professor - Student - the scientific method) where universities suffer at the present time from this problem, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Finite Element Analysis for the Damaged Rotating Composite Blade
...Show More Authors

In this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included.  The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Absorption and E-learning Readiness in Learning Digitization among Preparatory Stage in Qatar
...Show More Authors

Abstract

The study aims to examine the relationships between cognitive absorption and E-Learning readiness in the preparatory stage. The study sample consisted of (190) students who were chosen randomly. The Researcher has developed the cognitive absorption and E-Learning readiness scales. A correlational descriptive approach was adopted. The research revealed that there is a positive statistical relationship between cognitive absorption and eLearning readiness.

View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Reducing activity costs under Resource Consumption Accounting: An Applied Research in the MidlandRefineriesCompany-Al Daura Refine
...Show More Authors

The research aims to identify the importance of applying resource consumption accounting in the Iraqi industrial environment in general, and oil in particular, and its role in reducing the costs of activities by excluding and isolating idle energy costs, as the research problem represents that the company faces deficiencies and challenges in applying strategic cost tools. The research was based on The hypothesis that the application of resource consumption accounting will lead to the provision of appropriate information for the company through the allocation of costs properly by resource consumption accounting and then reduce the costs of activities. To prove the hypothesis of the research, the Light Derivatives Authority - Al-Dora Refin

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
مجلة اداب المستنصرية
اثر استعمال نظرية التلقي في تحصيل طلبة قسم اللغة العربية لمادة الادب الاسلامي في كلية الآداب في الجامعة العراقية
...Show More Authors

Publication Date
Fri Jan 04 2019
Journal Name
Journal Of Planner And Development
(الاستدامة في الحصول على الخدمات الحضرية (حالة تطبيقية على مدينة النجف الأشرف
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
وقائع المؤتمر الدولي الاول جامعة قناة السويس
اسلوب التفكير العالمي والمحلي وعلاقتهما بأنماط القيادة لدى تدريسي كلية التربية الاساسية
...Show More Authors

Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
The theory of distortion and eradication in modern Zionist Hebrew literature: תיאוריית העיוות והחיסול בספרות העברית הציונית החדשה
...Show More Authors

This title may have something strange or paradoxical; it is unusual or natural to look for violence in literature, or that literature is a tool for killing through the contribution of writers and poets in generating, feeding or advocating violence. The Zionist literature belongs to the 20th century, is almost the only literature among the etiquette of peoples, which professes racism and boasts of betraying its human role, and wants to be a vehicle for terrorism domination. It also tends to be a means in the hands of killers and adventurers.   Writers of this Literature show that no solution to the Jewish problem is only by Zionist presence to replace the Palestinian presence and to build the state of "Israel" on the ruins of Pa

... Show More
View Publication Preview PDF
Crossref