This research investigates the engagement of the Iraqi audience with ethnographic programs and their impact on knowledge enhancement and intellectual perspectives. A questionnaire consisting of closed-ended questions was designed and administered to a purposive sample of 400 participants who exclusively follow ethnographic programs and documentary channels. The data were transcribed and subjected to statistical analysis using the SPSS software to ensure reliability and test hypotheses. The findings revealed that Al Jazeera Documentary Channel had the highest viewership percentage among respondents for ethnographic programs, while DW (Deutsche Welle) had the lowest viewership percentage. This suggests that Al Jazee
... Show MoreTwo quantitative, environment-friendly and easily monitored assays for Ni (II) and Co (III) ions analysis in different lipstick samples collected from 500-Iraqi dinars stores located in Baghdad were introduced. The study was based on the reaction of nickel (II) ions with dimethylglyoxime (DMG) reagent and the reaction of cobalt (III) ions with 1-nitroso-2-naphthol (NN) reagent to produce colored products. The color change was measured by spectrophotometric method at 565 nm and 430 nm for Ni and Co, respectively, with linear calibration graphs in the concentration range 0.25-100 mg L-1 (Ni) and 0.5-100 mg L-1 (Co) and LOD and LOQ of 0.11 mg L-1 and 0.36 mg L-1 (Ni), and 0.15 mg L-1 an
... Show MoreThis research aims at building a proposed training program according to the self-regulated strategies for the mathematics teachers and to identify the effect of this program on relational Mathematics of teachers. The sample of the research was (60) Math teachers; (30) teachers as experimental group and (30) teachers as control group. The results of the current research reacheded that the proposed training program according to some self-managed learning strategies, meets the needs of trainees with remarkable effectiveness to improve the level of their teaching performance to achieve the desired goals. Training teacher according to self-managed learning strategies is effective in bringing about the transition of training to their students
... Show MoreThe use of Conservatism significant impacts on the financial statements and thus on financial reporting which is produced by these lists so Rate Some of the professionals that the principle of accounting while Rate of others as a constraint, and brought this category based on the uses of this restriction sometimes used the accountant this restriction and especially with the uncertainties in the Sometimes it may collide with some of the cases in which the accountant may be forced to leave in custody as a result of emergence of economic events that gave rise to rights or future commitments should be disclosed.
The emergence in custody mainly was due to the uncertainty and its essence is to report on a
... Show MoreIn this article, we developed a new loss function, as the simplification of linear exponential loss function (LINEX) by weighting LINEX function. We derive a scale parameter, reliability and the hazard functions in accordance with upper record values of the Lomax distribution (LD). To study a small sample behavior performance of the proposed loss function using a Monte Carlo simulation, we make a comparison among maximum likelihood estimator, Bayesian estimator by means of LINEX loss function and Bayesian estimator using square error loss (SE) function. The consequences have shown that a modified method is the finest for valuing a scale parameter, reliability and hazard functions.
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More