The issue of the research lies in the non-representation of the models developed for the communication process in the interaction and networking processes through social media, as the research sought to build a network model of communication according to the specific data and features of social media platforms in order to reach a special generalization to understand how the process of networking operates in cyberspace.
The researcher followed the analytical survey approach as she described the communication models outwardly in order to be able to build a networked communication model that represents the flow of post-reactive communication. Therefore, it has been named "Nebula - Sadeem" after the concept of post-space and cosmic g
... Show MoreThis present paper aim at knowing the process of evaluating the training program that could be applied in Maysan Health office for it significance and importance in field of management and vocational staff preparations of high scientific experience in different fields of Health. The society of research includes staffs working in Maysan Health Office , of specialists , dentists, pharmacists, laboratories, nursing and administrators. Their number is 100 employees, the researcher has designed questionnaire by depending on "Kirkpatrick" for assessing the training . The researcher has used thorough survey and has entailed 90 questionnaire,
... Show MoreEarth’s climate changes rapidly due to the increases in human demands and rapid economic growth. These changes will affect the entire biosphere, mostly in negative ways. Predicting future changes will put us in a better position to minimize their catastrophic effects and to understand how humans can cope with the new changes beforehand. In this research, previous global climate data set observations from 1961-1990 have been used to predict the future climate change scenario for 2010-2039. The data were processed with Idrisi Andes software and the final Köppen-Geiger map was created with ArcGIS software. Based on Köppen climate classification, it was found that areas of Equator, Arid Steppes, and Snow will decrease by 3.9 %, 2.96%, an
... Show MoreIn a hybrid cooling solar thermal systems , a solar collector is used to convert solar energy into heat energy in order to super heat the refrigerant leaving the compressor, and this process helps in the transformation of refrigerant state from gaseous state to the liquid state in upper two-thirds of the condenser instead of the lower two-thirds such as in the traditional air-conditioning systems and this will reduce the energy needed to run the process of cooling .In this research two systems with a capacity of 2 tons each were used, a hybrid air-conditioning system with an evacuated tubes solar collector and a traditional air-conditioning system . The refrigerant of each type was R22.The comparison was in the amou
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show More