Current research aims to analyze the relationship and impact of the explanatory variable transcendental leadership, which includes dimensions (values and attitudes, behavior, spirituality, vision and hope/faith) in the responsive variable university performance dimensions (relationships and resources available, human capital development, scientific research, community service). Field research for the leaders of a number of colleges of the University of Baghdad of the deans of the colleges of research and assistants of deans and heads of departments, the main research problem was the important question (what is the role of transcendent leadership in promotin
... Show More
ABSTRACT:
The study aimed to identify the impact of the role of voluntary accounting disclosure in enhancing confidence in the informational content of financial reports. Correlation - Spearman to measure the degree of correlation, as well as the method of simple linear regression analysis, and the study reached several results, including: The level of enhancing the information content in the annual financial reports of the Palestinian banks listed on the Palestine Exchange under study reached the overall average (total) (94.1%), and also Voluntary Accounting Disclosure in Enhancing Confidence in the Informational Content of the List of Change in Ownership Equity of Listed
... Show MoreThis paper demonstrates an experimental and numerical study on the behavior of reinforced concrete (RC) columns with longitudinal steel embedded tubes positioned at the center of the column cross-section. A total of 12 pin-ended square sectional columns of 150 × 150 mm having a total height of 1400 mm were investigated. The considered variables were the steel tube diameters of 29, 58, and 76 mm and the load eccentricity (0, 50, and 150) mm. Accordingly, these columns were divided into three groups (four columns in each group) depending on the load eccentricity (e) to column depth (h) ratio (e/h = 0, 1/3, and 1). For each group, one column was solid (reference), and the other three columns contained steel tubes with hollow rat
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.
Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc
... Show MoreTraffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c
... Show MoreA (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.