We must live in an era dominated by the call for equality between men and women, in which the voices of advocates of gender integration were heard. After women opened their doors to compete with their brother, Knowledge, and culture in the various forms of life, language as a science of the time and knowledge of the other had to match this reality and express the most accurate expression of this task
The importance of this research is due to its importance goals, Which are about the attempt of researchers to investigate the probability of depending on businesses, environments to transform organizations, performance in away that enhance the leading role of organizations in their environments , and through views of a number of the staff working in the foundation of technical institutes in Mosul. .
After deciding the methodology of the study that ,in one hand ,performs the goals of the study , and achieving a suitable theoretical framework to present the concepts of businesses, environments and the leadin
... Show MoreAbstract:
The aim of the research is to evaluate the practice of banking departments for strategic foresight represented by its dimensions (environmental scanning, future vision, scenarios, reconfiguration) and its relationship to the organizational brilliance represented by dimensions (brilliance of leadership, brilliance of service and innovation, brilliance of knowledge, brilliance of employees), as the research was applied in A number of private Iraqi commercial banks represented by (Baghdad, Iraqi Investment, Iraqi Middle East Investment, Commercial Gulf, Ashur International Investment, Al Mansour Investment, Via Iraq Invest
... Show MoreViolence is one of the most serious threats facing societies because it affects their internal structure and threatens the security and stability of society. It is classified as one of the types of security crises that are emerging in Arab and Islamic societies in particular, and in most countries of the world in general.
The threat of this crisis is increasing. Terrorism is considered as one of the most serious aspects of that all the countries of the world, currently, suffer from. The terrorism has begun to penetrate deep into society in one way or another starting from the Second World War, which led to the emergence of leftist movements in Western Europe, Japan, France, Italy and other countries as a result of emerging ideas
... Show MoreObjective: To evaluate the effectiveness of educational program on female students’ knowledge toward premenstrual syndrome.
Methodology: A quasi-experimental design study conducing on (140) student purposely in four secondary schools at Al-sadder city (70) student for study group and (70) for control group. The prevalence of PMS selected through American College of Obstetricians and Gynecologists (ACOG) (2015) criterias to select PMS students before program. The education program were set in four steps, the first step (pre-test) is to assess the knowledge , before the implementation of the program, the second step is implementing the program, following two steps post-test I and II between each test two weeks. Validity is determined
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreAbstract
Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The sim
... Show MoreAbstract
Most of the industrial organization in the world became suffering from the problem of the pollution of the poisonous chemicals things, this urged to depend on the principle of the responsible production, because it has the positive role by dealing with these chemical things and to safe the health of the society, due to the main goal of this study is to restrict the role responsible production in accomplishing the system of the environmental management through an actual study in the northern gas company in Kirkuk province, the topic has acquired a big importance bacause there were a limited number of studies and res
... Show MoreThe search aims to clarify pollution to negative effects on environment and to an increasing in the dangerous polluted materials that discharged out these factories. To make active procedures in order to limit the environmental pollution.
The search problem came from an assumption which has the researched factory is suffering from the lack of applying the international specification ( ISO 14004 ). The research problem assimilated by these questions:
- What is the level or organization in thinking of environmental system according to ISO 14004 .
- What are the requirements used in researched factor
This research work dealt with the problem of layout the production line of engine of fan roof at the General Company for Electrical Industries (GCEI). It was observed that the assembly line of engine was unstable and subject to severe fluctuations. In addition the execution of tasks at some stations was observed to be very fast while at other stations was slow. This phenomenon resulted into bottlenecks between workstations, idle time, and work in process. The system design was used to assign tasks to work stations according to different heuristics (Ranked Positional weight techniques, longest Task Time, Most following tasks, Shortest tasks time, Least number of following task).
The study revealed that th
... Show MoreThe current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show More