This research deals with the effect of constructive conflict of the organizational identification .These relatively recent subjects have relative importance in the field of administration and they have strong effect in the success of organizations .The objective of this research is to detect the level of the constructive conflict and the organizational identification in the center of The Ministry of Planning. So, two major hypotheses were formulated The first are searched the correlation between the constructive conflict and the organizational identification and it emerged with four sub-hypotheses searched the correlation among every dimension of the constructive conflict with the organizational identification .The second major hypothesis searched the effect of constructive conflict on the organizational identification and it emerged with four sub-hypotheses searched the effect of every dimension of constructive conflict on the organizational identification. Several statistical methods have been used in this research such as the Mean, the Spearman correlation, the simple linear regression, and the multiple linear regression .This research is applied on the random sample in the center of the ministry of planning. The number of individuals of this sample was (83). The information is collected by questionnaires and personal interviews. The research reached to a set of conclusions. The most important is that there is a correlation between the constructive conflict and the organizational identification. Moreover, there is an effect of constructive conflict on the organizational identification. The research has concluded that the constructive conflict and the organizational identification have not been at the required level. Also, there is no strong correlation and strong effect of constructive conflict on the organizational identification. The research ends with a set of recommendations, the most important is the necessity to educate employees in this ministry about the positive effects of the constructive conflict and its role to create a climate of cooperation and trust among the employees and its role to improve performance in this ministry and the necessity of keeping away from (win – lose) logic in the conflict. The ministry must also mind and maintain the positive relationship which link the employee with this ministry for this relationship contributes to increase the motivation and the desire to stay to work in the ministry and its effect on the performance and raise the efficiency of the employees
Heuristic approaches are traditionally applied to find the optimal size and optimal location of Flexible AC Transmission Systems (FACTS) devices in power systems. Genetic Algorithm (GA) technique has been applied to solve power engineering optimization problems giving better results than classical methods. This paper shows the application of GA for optimal sizing and allocation of a Static Compensator (STATCOM) in a power system. STATCOM devices used to increase transmission systems capacity and enhance voltage stability by regulate the voltages at its terminal by controlling the amount of reactive power injected into or absorbed from the power system. IEEE 5-bus standard system is used as an example to illustrate the te
... Show MoreCoagulation - flocculation are basic chemical engineering method in the treatment of metal-bearing industrial wastewater because it removes colloidal particles, some soluble compounds and very fine solid suspensions initially present in the wastewater by destabilization and formation of flocs. This research was conducted to study the feasibility of using natural coagulant such as okra and mallow and chemical coagulant such as alum for removing Cu and increase the removal efficiency and reduce the turbidity of treated water. Fourier transform Infrared (FTIR) was carried out for okra and mallow before and after coagulant to determine their type of functional groups. Carbonyl and hydroxyl functional groups on the surface of
... Show MoreIn this research, 5- membered heterocyclic compounds as oxazolidine-5-one J1-J5 derivatives were prepared using primary aromatic amine, aromatic carbonyl compounds and chloroacetic acid. By combining primary aromatic amines and aromatic carbonyl compounds, Schiff's bases were synthesized. Schiff bases are used with the chloroacetic acid compound to prepare oxazolidine-5-one J1-J5 derivatives. The compounds J1-J5 were described using NMR spectroscopy and FT-IR. .The biological efficacy was evaluated according to maximum inhibitory concentrations (MICs) toward Staphyloccoccus aureus and Esherichia coli. The best MIC was 210 μg ml-1 for J4 against the two pathogenic bacteria, while J1, J4, and J1 did not show any inhibitory effect against all
... Show MoreSingle phase capacitor-run induction motors (IMs) are used in various applications such as home appliances and machine tools; they are affected by the sags or swells and any fault that can lead to disturb the supply and make it produce rms voltage below or above the rated motor voltage, which is 220V. A control system is designed to regulate the output voltage of the converter irrespective to the variation of the load and within a specific range of supply voltage variation. The steady-state equivalent circuit of the Buck-Boost chopper type AC voltage regulator, as well as the analysis of this circuit are presented in this paper. Switching device for the regulator is an IGBT Module. The proposed chopper uses pulse width modulation (PWM) c
... Show MoreBackground: In recent years, the immediate loading of dental implants has become more accepted as a standard protocol for the treatment of the edentulous area. Success in implant dentistry depends on several parameters that may improve phenomenon of osseointegration and new bone formation in close contact with the implant. The aim of study was to evaluate the effect of strontium chloride coating of screw shape commercially pure titanium dental implant osseointegration at bone - implant interface by histomorphometric analysis and compare with hydroxyapatite coating at 2 time periods (2 weeks and 6 weeks). Materials and methods: Electrophoretic Deposition Technique (EPD) was used to obtain a uniform coating layer on commercially pure titanium
... Show More4,4'-(pyridine-2,6-diylbis(1,3,4-oxadiazole-5,2-diyl))bisphenol monomer (3)was synthesized from cyclization of N'2,N'6-bis(4-hydroxybenzylidene)pyridine-2,6-dicarbohydrazide (2)in the presence of bromine in glacialacetic acid. Newly five polymers (P1-P5) were synthesized from reaction bis-1,3,4-oxadiazole bisphenolmonomer with five different di acid chloride. The antibacterial activity of the synthesized polymers was screened against gram positive and gram negative bacteria. Polymers P4 and P5 exhibited significant antibacterial against all microorganisms, as well these polymers showed highest antifungal activity.
Abstract—Background: Polycystic ovary syndrome (PCOS) is a prevalent hormonal disorder affecting reproductive- age women, often linked to metabolic issues like insulin resistance. Objective: this study aimed to evaluate ornithine decarboxylase (ODC) and ferric reducing capacity (FRC) levels in women with PCOS, with assess the effects of metformin and Primolut N treatment on their levels. Subjects and Methods: A case− control study was conducted with 150 married Iraqi women, categorized into three groups: 50 healthy controls, 50 untreated PCOS, 50 treated PCOS. Blood samples were analyzed for ODC, FRC levels and hormonal profiles. Statistical analysis applied independent t-test, Pearson’s correlation, ROC curve. Results: The ODC level
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More