In today’s competitive environment, organizational efficiency and sustained growth are crucial for survival. The performance of an organization is intricately connected to strategic planning, prompting firms to gather and leverage competitive information for a competitive advantage. Senior managers, recognizing this, initiate actions accordingly. This study aims to investigate the relationship between foresight, vision, strategic partnerships, motivation, system thinking, and organizational performance. Data, gathered through a self-administered questionnaire from various textile units, were analysed using structural equation modelling (SEM). The findings indicate that sub-constructs of strategic intelligence positively impact organizational performance, offering valuable insights for strategists in the textile industry to enhance overall organizational effectiveness
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
A Multiple System Biometric System Based on ECG Data
The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
This research aim at finding out the impact of using the strategy of shape V on the achievement of the students of the Department of Artistic Education in the subject of "Principles of scientific Research ". This strategy is one of the cognitive strategies used in this topic . To verify the aim of the research ,the two researchers have put the following null hypothesis:-There are no significant differences on the level of 0,05 among the average degrees of the students of the experimental group in their answers on the topics of the pre and post cognitive achievement tests of the subject of "principles of scientific Research " . The two researchers have adopted the experimental approach which consists of one group . the population of the r
... Show MoreThis study was investigated the role of garlic extracts on the reproductive functions, via the development of immature male mice (25 days old) un l puberty. Immature male mice were divided into 3 groups (n=25). Group 1 "control" was daily administrated with tap water. Group 2 was daily administrated with cold aqueous garlic extract. Group 3 was daily administrated with hot aqueous garlic extract. Each group was randomly consisted of 5 subgroups (n=5/ subgroup) and administrated for different periods i.e, 1, 2, 3, 4 and 5 weeks respectively. Animals were scarified after 24 h from last treatment. Our findings elucidated that, cold and hot aqueous garlic extracts, when administrated at 25 days old (Immature period) have different impact dep
... Show MoreThis study was carried out at Poultry Research Station, State Board of Agricultural Research, Ministry of Agriculture for the period from 27 September 2014 to 9 November 2014 to evaluate the Supplementation of different levels of Conjugated Linoleic Acid (CLA) on productive performance of broiler. Four hundred eighty chicks (Ross-308),one day old were randomly distributed to four dietary treatments for 42 days of age with 3 replicates/vtreatment (40 bird/replicate). Experimental treatments were as follow; T1 (Control diet) without supplement, while the treatment T2,T3 and T4 were Supplemented with 1, 1.5, 2 g CLA /kg diet respectively. The results showed significant (P ≤ 0.05) increased in mean of body weight, weight gain, ave
... Show MoreThe aim of the research is to identify the reality of strategic planning in the National Insurance Company and its importance in building institutional work and to identify the requirements that enable this company to successfully implement strategic planning and the obstacles that limit its application and then achieve the marketing objectives of this company. This study started from the fact that there is a problem represented by the main question that was stated.  
... Show MoreA mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show More