This research aims to identify the relationship between occupational hypocrisy and organizational strategic success, It was done by analyzing the correlations and influence between variables, applied to a random sample of university professors at the University of Kufa faculty of administration and economic.
The main tool for data collection is the survey were questionnaires were distributed randomly to the professors , and (43) questionnaires were returned, and test its validity by using (SEM) (Structural Equation Modeling), Hypothesis has been tested by using Statistical Package for Social Sciences (SPSS v. 18), The research found a set of conclusions:(The occupational hypocrisy has
... Show MoreABSTRACT : The restoration of bone continuity and bone union are complex processes and their success is determined by the effectiveness of osteosynthesis. The use of plants for healing purposes predates human history and forms the source of current modern medicine. This research was planned to study the histological and immunohisto-chemistry of osteocalcin to evaluate of effect of local application of lepidium sativum oilon healing of induced bone defect in rat tibia. In this study, fourty albino male rats, weighting (300-400) gram, aged (6-8) months, will be used under control conditions of temperature, drinking and food consumption. The animals will subject for a surgical operation of medial side of tibiae bone, in control group the bone
... Show MoreBackground: The repair of bone defects remains a major clinical challenge in dentistry. Bone is a highly vascularized tissue reliant on the close spatial and temporal connection between blood vessels and bone cells to maintain skeletal integrity. The health promotive , preventive, and curative properties of herbs were recognized by the ancient and the present pharmacist and physicians to form the theoretical foundations in Medicine. Objective: Immunohistochemistry of osteocalcin and histological study to prove that symphytum officinale oil when applied locally on generated bone defect healing in rat tibia, it was very effectiveness. Patients and Methods: 0ur study fourty male rats , weighting (250-350) grams ,aged (5 7)months ,was
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThis piece of research deals with assimilation as one of the phonological processes in the language. It is a trial to give more attention to this important process in English language with deep explanation to its counterpart in Arabic. in addition, this study sheds light on the points of similarities and differences concerning this process in the two languages. Assimilation in English means two sounds are involved, and one becomes more like the other.
The assimilating phoneme picks up one or more of the features of another nearby phoneme. The English phoneme /n/ has t
... Show MoreIn this work, we focused on studying 1,4-naphthoquinones and their derivatives, and knowing the methods of preparing them using different auxiliary agents and forming derivatives containing heterocyclic rings, active groups and saturated rings containing heterogeneous elements . In addition, due to their strong antibacterial, antifungal and anticancer activity, 1,4-naphthoquinone compounds biological importance and are considered a source of various pharmaceutical compounds.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreWhen scheduling rules become incapable to tackle the presence of a variety of unexpected disruptions frequently occurred in manufacturing systems, it is necessary to develop a reactive schedule which can absorb the effects of such disruptions. Such responding requires efficient strategies, policies, and methods to controlling production & maintaining high shop performance. This can be achieved through rescheduling task which defined as an essential operating function to efficiently tackle and response to uncertainties and unexpected events. The framework proposed in this study consists of rescheduling approaches, strategies, policies, and techniques, which represents a guideline for most manufacturing companies operatin
... Show More