The aim of this paper is to study the frames of Argument of normalization with Israel on the websites of the satellite channels directed in the Arabic language (Al-Alam and Al-Hurra Iraq) channels by analyzing the mechanisms of framing an Argument, The way in which we frame an issue largely determines how that issue will be understood and acted upon، The research adopted the survey method applied to the sites of(Al-
Alam and Al-Hurra) channels, at the period 13 Aug. - 12 Nov. 2020, which included (855) news items, (633) for Al-Alam channel website, and (222) for Alhurra Iraq channel website.
The most important results are: The two channels dependence on the Argument Directed, Al-Alam channel focuses on Islamic and Arab attitudes,
In Iraq, government contributions to the public companies have become a very important aspect which contributes to the survival and sustainability of these institutions as it consider one of the main sources of funding, if not it consider the basis of funding.
According to the vital roles assigned to these institutions to follow up, which usually include important activities in the national economy, the research focused on studying the field reality of the method used in evaluating the stock of total production and purchases of goods for the purpose of selling the strategic commodities of the General Company for Grain Trade. As a result, the aim of this study came to came to highlight&n
... Show MoreThis article discusses the function of semiotics in political discourse after the socio-political processes taking place in Iraq since 2003 and its role in the development of textual criticisms of some Iraqi politicians, analyzes the reasons for its functioning in the speech of politicians. The research is mainly focused on finding out to what extent political text studies draw on sign systems that can store and transmit information, the nature of its purpose and the use of available fields for the purpose to be achieved. The chief purpose of the study is to investigate and also clarify the symbols and signs appear within the framework of discursive Iraqi politicians, the nature of the symbols used, and the meanings that are include
... Show MoreAbstract
financial market occupy very important place in the economic activity all over the world countris, and its importance increased with considerable technological progress in the world of transportation ,communications and information where its impact have spread over the whole world, which led to link the international economy in a kind of international relations so that the open policy became the prevailing trend in national and regional economies within the framework of the new world order.
the international economy has faced the financial crisis, global, that hit all world economies although the United States is the center of the crisis and the starting spark for it w
... Show MoreThis research aims at shedding light on the concept of insurance awareness and clarifying its role on marketing insurance services of a sample of (100) employees in the National Company for Insurance. Questionnaire is used as a main instrument for collecting data and information from the sample. Their answers were analyzed by using arithmetic means, standard deviation, centesimal weight, and the correlation coefficient ( , F, t) tests .The research reached several conclusions of which:1.The sample member's response to insurance awareness and marketing insurance services factors was in the medium level.2.There was a positive relationship of a moral sign between insurance awareness and marketing insurance services, that correlation coeffic
... Show MoreAbstract
The research study about the empowerment as an independent variable, in which details include (training and improvement, incentives, information sharing, trust, and delegation), has also focused on the performance of the service organization as a dependent variable in all dimensions which include (improve work efficiency, building the core competencies, focus on the beneficiary of the service, increasing the feeling of satisfaction of the employees, and the organizational support commitment). The research has been based on the opinions of a chosen sample of 75 service officers of the Ministry of Interior who work at the General Directorate of Traffic. The research problem has been identified by t
... Show MoreSuccessfully, theoretical equations were established to study the effect of solvent polarities on the electron current density, fill factor and efficiencies of Tris (8-hydroxy) quinoline aluminum (Alq3)/ ZnO solar cells. Three different solvents studied in this theoretical works, namely 1-propanol, ethanol and acetonitrile. The quantum model of transition energy in donor–acceptor system was used to derive a current formula. After that, it has been used to calculate the fill factor and the efficiency of the solar cell. The calculations indicated that the efficiency of the solar cell is influenced by the polarity of solvents. The best performance was for the solar cell based on acetonitrile as a solvent with electron current density of (5.0
... Show MoreThe aim of this research is to adopt a close range photogrammetric approach to evaluate the pavement surface condition, and compare the results with visual measurements. This research is carried out on the road of Baghdad University campus in AL-Jaderiyiah for evaluating the scaling, surface texture for Portland cement concrete and rutting, surface texture for asphalt concrete pavement. Eighty five stereo images of pavement distresses were captured perpendicular to the surface using a DSLR camera. Photogrammetric process was carried out by using ERDAS IMAGINE V.8.4. The results were modeled by using a relationship between the photogrammetric and visual techniques and selected the highest coefficient of determinatio
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the