The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions, Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.
This study comes as: The responsibility of the Iraqi newspapers in promoting the political culture inside society, an analytical study in newspapers: Al-Sabah, Al-Ittihad, Al-Aalam for 2/ 3/ 2013 to 31/ 3/ 2013 to spot light on the extent to which the three mentioned newspapers are compliance with the promotion of the political culture inside society which is seen as one of the essential requirements for the success and promotion of the democratic process inside society.
The study aims to: finding out the extent to which these newspapers are compliance with their responsibility in the promoting the political culture inside society; knowing the nature of their role in pr
... Show MoreBesides the role of state institutions that come in the forefront of their priorities and obligations to provide security and development of the economy and reduce the unemployment rate and the reduction of inflation and improving education, health and others, the Community Partnership At frames what has become known as the institutions of society civil-with the state does not eliminate the role, but rather complements its role ; it is the role of civil society partner and an extension of the role of the state in the face of challenges and crises, but it may be sometimes a race role in addressing social, political and economic issues of the role played by the state, not complementary.
The highlighting the specificity of the relationsh
The aim of the research is to show the extent of the impact of administrative coordination on municipal performance after the state’s tendency to implement administrative decentralization and transfer of powers (administrative, legal, financial, and technical) from the Federal Ministry (construction, housing, municipalities, and public works) to local governments (governorates), to meet local needs, And since the municipality is considered one of the local administrative institutions and most of its goal is to provide increased municipal services to citizens due to population growth and urban expansion of cities by coordinating their actions using their powers, and in order to address gaps i
... Show MoreAbstract :
The present study aims at identifying the status of the two research variables in the organization under study and specifying the relationship and impact of the authentic leadership with all its four branch dimensions of (self-awareness, transparent relations, balanced processing of information and the moral perspective) on business process reengineering.
The basic problem of the study lies in the attempt to present a new leadership style that is more responsive to the dynamic changes surrounding it based on the authentic leadership behaviors. This is because this pattern has an impact on the nature of the organization's work and its progress.
The research
... Show MoreAbstract
This study aimed to survey fungi associated with the product Indomie and Chips being the trades Iargely by a very important segment of society who are the children, beside consumed by adults, but less so, as the survey results to accompany some fungui samples sterile showed proportions presence included various fungi like. Aspergillus flavus, Aspergillus niger, Penicillium Spp., Fusarium graminearum, F.moniliforme, Alternaria alternate and Rhizopus Spp., and other fungi sterile are not diagnosed. The results showed large dominion fungi A. niger by presence sterile samples of both producers, followed by infection in Fusarium Spp., Penicillium Spp., and A. alternata by infection percentage 55, 20 and 17% respectively for the pr
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe objective of the study is to study how to employ performance evaluation in achieving organizational integrity and the impact of performance evaluation on achieving organizational integrity. In light of this, the following questions were raised:
Are the dimensions of organizational integrity available in the field in question?
In order to answer the research questions, a questionnaire questionnaire was distributed to the sample of 30 members of the teaching staff at the Technical Institute in Mosul. The three-dimensional Lycert scale was used. The statistical methods were used, ie, the frequency distribution, the computational circles, the standard deviations, Pearson), simple
... Show More