xxxxxx
The sustainable competitive advantage for organizations is one of the requirements for value creation, which centered on the possession of scarce resources that achieve maximum flows to invest in intellectual capital, if what has been interest in them, measured and employed the way properly and style, so I figured the need for new technologies to enable organizations to measure the intellectual and physical assets and to assess its performance accordingly, so it sheds search light on the measurement of the added value of existing knowledge using the standard value-added factor is the intellectual (value added intellectual coefficient) (VAIC) and to develop a set of assumptions about the extent of the difference between the sample
... Show MoreThe one-dimensional, cylindrical coordinate, non-linear partial differential equation of transient heat conduction through a hollow cylindrical thermal insulation material of a thermal conductivity temperature dependent property proposed by an available empirical
function is solved analytically using Kirchhoff’s transformation. It is assumed that this insulating material is initially at a uniform temperature. Then, it is suddenly subjected at its inner radius with a step change in temperature. Four thermal insulation materials were selected. An identical analytical solution was achieved when comparing the results of temperature distribution with available analytical solution for the same four case studies that assume a constant the
This research attempts to shed light on a topic that is considered one of the most important topics of HRMs management, which is the Employee centric approach by examining its philosophy and understanding . To achieve the goal, the research relied on the philosophical analytical method, which is one of the approaches used in theoretical studies. The research reached a set of conclusions, the most important of which are the theoretical studies that addressed this entry in the English language and the lack of it in the Arabic language, according to the researcher's knowledge. The research reached a set of recommendations, the most important of which was that this approach needs more research, analysis and study at the practical and th
... Show MoreThe personal drama in particular, and one of the key elements underlying the dramatic structure to convey ideas and visions presented by the author when writing the text of the dramatic fall after that on the way out the submission form that suits the proposals of the text and processors directorial would push the wheel of dramatic structure to the front. So take the maker of the artwork (writer) undertook the transfer of those events and personalities in art presumed sometimes real and sometimes, in order to enrich the art inspired by the human reality through the ages, and full of its themes and ideas that led to the development experiences of peoples experiences of living. Therefore, we find it important to research in the characters
... Show MoreAbstract
The curriculum is amodern science which reflects the social philosophy and
what it needs . It searches for amothod that limits the knowledge that the
indiridual gets in the society and the sorts of the culture that suits the enrironment
in which they live. It also clears for them their history and their great in heritance.
It has a great in flunce in their mental growth ,and it teacher the students new
roles in the thin king ,and training then on what they have learned . According to
there points the problem concentrats on the mostimpotant difficulties which facer
thestudents in studing Arabic langnage text-books
In spite of the great care that the text taker but it is full of subjects and studies
w
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More