This research aims at identifying the communicative habits and content reflections on the communication process, especially the young audience which is one of the main group for whom the announcements are made. Because young people face life with passion and aspiration making them respond to each effect used by the media in the design of the advertising using all the effective techniques, attractive methods for young children like depending on drama, technical tricks, music and logos easily to be remembered and responded to the desires of the young in their entertainment. This research also aims at identifying the impact of the internet as a channel of commercial advertising on the purchasing behavior of young people at the universities
... Show MoreThe monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to
... Show MorePOSSIBILITY OF APPLICATION THE BALANCED SCORECARD IN THE IRAQI INDUSTRIAL COMPANIES: A PROPOSED MODEL
In this paper we have dealt with the word " בַּיִת" in the Book of Joshua because it makes one of those that highly employed the word בַּיִת" " in the Old Testament. The Book of Joshua comes sixth in the order of tanakh wich was written by Joshua son of Noon in Palestine during the fifteenth century B.C. and it covers a three-decade era extending from the death of Moses til the death of Joshua son of Noon.
The word " בַּיִת " in this paper refers to the place, where expressions are made by a noun modified by a noun . The modifier is"" בַּיִת , and the modified is another noun. Herein, we
... Show MoreThis paper aims at discovering the real implication of deduction in the Arabic culture
with concentration on its applications in Arabic grammar, logic, and fundamentals of Islamic
legislations. Some light has been shed on deduction in the Arabic culture but most of recent
works did not analyze deduction according to the pragmatic analysis. This paper will answer
the following questions:
to what extent deduction in Arabic grammar could comprehend with deduction l logic and
fundamentals of thinking in Islamic thought?
how can we find the deduction thinking in the Qur’anic surah if Ghafir?
Can we find parts of deduction in the surah?
The methodology in this paper is descriptive analytical. This metho
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show More