Objectives: The research aims to highlight the semiotic approach and apply it to a photograph of the Pope's reception at Baghdad International Airport, published on the page of the Media Office of Iraqi Prime Minister Mustafa Al-Kazemi in the Twitter application, in order to study its components, analyze its contents and clarify its implications, as well as approach the image as a political and media act. Methods: The stages of research were accomplished by "investigation, observation, and analysis", and the dismantling of the composition of the photograph, thus revealing the hidden and hidden aspects, relying on the semiotic approach to analysis. Results: The study showed that the ideas and meanings included in the image in form
... Show MoreThe current research discusses “The impact of the critical factors for the transfer of knowledge on opportunities and strategic success ", the attention have been increased on knowledge transfer and strategic success subjects because on being one of the important and contemporary issues, which have a significant impact on the existence of organizations and its future. The research aims to identify the critical factors for knowledge transfer in private high education environment which enables (the college community surveyed) to achieve strategic success, also the research sought to answer questions related to research problem by testing a number of major and minor hypothes in impact, in order to test the hypotheses I used a fiel
... Show MoreThe research aims to measure the sustainability of the Iraqi economy for the period 1990-2018 as well as to show the impact of fluctuations in the level of GDP on financial sustainability, where financial sustainability is the necessary and sufficient condition for achieving economic and financial balance in the country, as financial sustainability reflects the movement of the state budget and its relationship to GDP through the indicators of deficit, fiscal surplus and public debt internal and external, as well as reflecting the art of managing public debt, and the more managed public debt is achieved, the more the management of public debt is achieved financial sustainability. for the state in the sense that there is a reciprocal
... Show MoreIndustries copper a craft that requires precision and patience great in the processes of industrialization and execution of product launches brass designs and a variety of forms , and the goal of research into the possibility of the use of modern technologies in the development of industries copper local , and identifies research study models of industries copper local to the city of Baghdad , and are available in the markets for the period from (200 - 2011) , Chapter II Multi industries copper local and technical in the copper industry , and after analysis models the sample was the most important conclusions : can work forms a multi- product copper formations deep or window using the technique work motifs and patterns. - formations deco
... Show MoreThe aim of this research is to prepare a set of complexes with the general formula [M(HMB)n] , where M=VO (II) , Cr(III) and Cu(II) while n=2,3,2 respectively resulting from the reaction of anew ligand [N'-(2-hydroxy-3-methoxybenzyl)-4-methylbenzohydrazide] (HMB) derived from the reaction of the tow substances (4-methylbenzohydrazide and 2-hydroxy-3-methoxy benzaldehyde) with metal ions. The prepared compounds were identified by several spectroscopic methods such as Infrared, Nuclear Magnetic Resonance and Electronic Spectra. From the results of the measurements, it was suggested that the prepared complexes have different geometries such as square planar (Cu), square pyramidal (VO) and octahedral (Cr). DFT simulations backed up
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreBinary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show More