This study assesses the short-term and long-term interactions between firm performance, financial education and political instability in the case of Malaysia Small to Medium Enterprises (SMEs). The simultaneous insertion of financial education and political instability within the study is done intentionally to inspect the effect of these two elements in one equation for the Malaysian economy. Using the bound testing methodology for cointegration and error correction models, advanced within an autoregressive distributed lag (ARDL) framework, we examine whether a long-run equilibrium connection survives between firm performance and the above mentioned independent variables. Using this method, we uncover evidence of a positive long-term link b
... Show MoreThis research aims to know the reality of implementation of Knowledge Management in Saudi Universities Applied in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.
The study investigated the university staff in Shaqra, Thadig, and Huraymila branches, using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.
The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo
... Show MoreIn the midst of rapid changes and difficultiesand the tough competition faced by the Iraqi banks, it has become necessary to focus on a significant aspect of administrative work; that is strategic planning and the key role of implementation within this process in improving the banking service quality. It has emerged as a critical and main competitive weapon for distinguishing the services provided by banks from each other in an effort to participate in increasing market share of the bank in question in question; in its growth, continuation and profit increase.
The research has addressed the relation between the independent variable (implementation within strategic planning), and the dependent variable (banking service quality and
... Show MoreThe research examines the mechanism of application of )ISO 21001: 2018( in the Energy Branch- Electromechanical Engineering at the University of Technology to achieve the quality of the educational service to prepare the branch to obtain the certificate of conformity with the requirements of) ISO 21001: 2018(, the necessary data were collected Depending on the (CHEKLIST) of (ISO 21001: 2018), field interviews and records of the concerned department, The researchers reached a number of results, the most prominent of which was the adoption of high quality leadership leaders and their willingness to implement the standard requirements, The university has a basic structure that qualifies it to implement the international standard, as
... Show MoreThe study aims to build a proposed training program for school leaders in the Sultanate of Oman on the planning practices of the Kaufman model in light of the needs and challenges of reality. It also aims to identify the challenges facing school leaders in practicing the stages of strategic planning. To achieve these objectives, the study adopted the descriptive approach due to its suitability to the nature of the study. A questionnaire was used to collect the needed data. The study sample included (225) individuals from school principals, their assistants and senior teachers in post-basic education in the Sultanate of Oman. After processing the data statistically, the study concluded that the reality of planning practices for school lea
... Show MoreThe problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as
... Show Moreإن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة بين المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ
... Show MoreThere are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More