The research aims to clarify the role that psychological ownership, through its dimensions, plays in deterring the effects of toxic leadership, through its dimensions, in the Ministry of Industry and Minerals. The research started with a basic problem represented by the following question: "Using psychological ownership and its application in deterring the negative effects of toxic leadership." The research used the descriptive-analytical method. The sample was randomly selected from workers in some selected companies affiliated with the Ministry of Industry and Minerals in Baghdad, and the sample size reached 124 individuals. One of the most important results is that there is an effect of the psychological ownership variable, based on the four dimensions, on deterring toxic leadership behaviors in its five dimensions. Psychological ownership, stemming from individuals' feelings of ownership and connection, affects attitudes and behaviors in various contexts, including toxic leadership. The consequences of these behaviors can be harmful to individuals and organizations if left unaddressed.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreA land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu
... Show MoreThis paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MorePhotovoltaic (PV) devices are widely used renewable energy resources and have been increasingly manufactured by many firms and trademarks. This condition makes the selection of right product difficult and requires the development of a fast, accurate and easy setup that can be implemented to test available samples and select the cost effective, efficient, and reliable product for implementation. An automated test setup for PV panels using LabVIEW and several microcontroller-based embedded systems were designed, tested, and implemented. This PV testing system was fully automated, where the only human intervention required was the instalment of PV panel and set up of required testing conditions. The designed and implemented system was
... Show MoreDeep drawing process to produce square cup is very complex process due to a lot of process parameters which control on this process, therefore associated with it many of defects such as earing, wrinkling and fracture. Study of the effect of some process parameters to determine the values of these parameters which give the best result, the distributions for the thickness and depths of the cup were used to estimate the effect of the parameters on the cup numerically, in addition to experimental verification just to the conditions which give the best numerical predictions in order to reduce the time, efforts and costs for producing square cup with less defects experimentally is the aim of this study. The numerical analysis is used to study
... Show MorePhotodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
New series of metal ions complexes have been prepared from the new ligand 1,5- Dimethyl-4- (5-oxohexan-2- ylideneamino) -2-phenyl- 1H-pyrazol-3 (2H)-one derived from 2,5-hexandione and 4-aminophenazone. Then, its V(IV), Ni(II), Cu(II), Pd(II), Re(V) and Pt(IV) complexes prepared. The compounds have been characterized by FT-IR, UV-Vis, mass and 1H and 13C-NMR spectra, TGA curve, magnetic moment, elemental microanalyses (C.H.N.O.), chloride containing, Atomic absorption and molar conductance. Hyper Chem-8 program has been used to predict structural geometries of compounds in gas phase, the heat of formation, (binding, total and electronic energy) and dipole moment at 298 K.
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show More