The study aims to identify the role of family in inculcating the moral values of voluntary work among adults, as it constitutes the basic social institution that is responsible for raising and control children. It has regarded as the first phase of constituting societies, where family plays a significant role in changing the behavior of individuals positively or negatively through provided patterns. The moral values act as organizer of human relationship in which misusing of these values would affect the interaction between people. This study focuses on how to employ the moral values in voluntary work as a civilized behavior helps in developing and strengthening societies. The researcher adopted the analytical-descriptive approach as mor
... Show MoreThe personality characteristics of the Leader are considered one of the main elements to reach into business organizations entrepreneurship; and because of the development of the organizations of the continuous transformations as result of huge Competition in private High Education sector, there is a great need for Leaders characterized of certain personality capable of managing their organizations and can positively effect on them. Also these organizations' success to reach into entrepreneurship requires a main significant element that is (strategic flexibility) which is considered one of the important elements for success.
Accordingly, this research is trying to fin
... Show MoreThere are many studies that discussed the famous museum's graveyards in the Islamic worlds, to study the lives of these figures, there are many difficulties for their studies because the first we need the regularity and history information, and many sciences support, such as in language, geography information.
I am studying the research from Maraqid Al-Maaraf book by Harz Aldeen, the book has large members about the persons have graved in Persian Country in the middle ages, there are more than (30) figures in my study, I have studied every figure in this research depending on the sources and references books.
The research focuses on determination of best location of high elevated tank using the required head of pump as a measure for this purpose. Five types of network were used to find the effect of the variation in the discharge and the node elevation on the best location. The most weakness point was determined for each network. Preliminary tank locations were chosen for test along the primary pipe with same interval distance. For each location, the water elevation in tank and pump head was calculated at each hour depending on the pump head that required to achieve the minimum pressure at the most weakness point. Then, the sum of pump heads through the day was determined. The results proved that there is a most economical lo
... Show MoreIntroduction: Articaine was developed in 1969, with reported advantages which are increased potency, increased duration of its anesthetic effect and superior diffusion through bony tissue. The effectiveness of using 4% articaine infiltration for extraction of mandibular molar teeth in comparison to 2% lidocaine inferior alveolar nerve block is not settled yet. Aim: The aim of this study was to evaluate the effectiveness of using 4% articaine infiltration for extraction of mandibular molars by comparing it to the use of 2% lidocaine inferior alveolar nerve block in terms of success, the volume of local anesthetic agents and the pain experienced during the procedure. Materials and methods: A prospective randomized controlled study included
... Show MoreThe research aims to assess the local accounting procedures related in one of developments that have taken place, and largely on the structure of the Iraqi economic activity. But a partnership between the (public and private sector), or one of the types of joint arrangements, and through the use of the analytical method and extrapolate the reality of the accounting treatments in Company research sample. Research found to a number of conclusions that the unified accounting system applied in the economic units that deal with contracting joint arrangements formula suffers from obvious shortcomings, and reflected the common arrangements suffer from obvious shortcomings. and reflected on the quality of financial reporting, and the urgent need
... Show MoreThe process of capital investment appraisal takes hold the attention of managers and accountants of the industrial companies. This process involves the use of multiple and diverse financial evaluation methods to measure the economic attractiveness of capital investment peojects. This multiplicity and diversity of financial evaluation metods have been the motive of this research to: investigate some organizational variables such as the desired objectives, identify managerial procedures which regulate the capital investment process, specify evaluation methods and examine the relationships between these variables and evaluation methods actually used by a sample of public industrial companies in Jordan.
The data wa
... Show MoreEM International
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More