Preferred Language
Articles
/
7Rev-44BVTCNdQwC51pQ
Needs in the stories of the Brothers Grimm (a study in content analysis)
...Show More Authors

The current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and two external analysts, where the agreement coefficient between the researcher and the first analyst reached 83.05%, while the agreement coefficient between the researcher and the second analyst reached 80. 35%. The G. Cooper equation was adopted to extract the stability and percentage as a basis for the frequency of needs in the research sample. The results of data analysis showed the presence of (811) ideas that express needs, according to which the first nine needs were chosen on the basis that they are the most emphasized needs in the sample of analyzed stories, which are: 1. n Cognizance / 2. n Aggression / 3. n Dominance / 4.n Nurturance / 5. n Deference / 6. n Harmavoidance / 7. n Inhibition / 8. n Decite / 9. n Recognition . From the same standpoint, the last nine needs were chosen on the basis that they are the least certain needs, which are: 1. n Exhibition /2. n Seclusion / 3. n Noxavoidance / 4. n Intensity / 5. n Abasement / 6. n Autonomy / 7. n Retention / 8. n. Affiliation /9. n Sex . The researcher concluded his research with a set of recommendations and proposals.

Publication Date
Sat Aug 01 2020
Journal Name
Heat Transfer
A parametric study of a photovoltaic panel with cylindrical fins under still and moving air conditions in Iraq
...Show More Authors

Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Computer Science
Peer-to-Peer Video Conferencing Using Hybrid Content Distribution Model
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
Theoretical asp ects of trans lation of a lite rary text in the fram ework of lingu istic and cult ural analysis: Теоретические асп екты перевода художес твенного текста в рам ках лингвокультурологического ана лиза
...Show More Authors

          The present art icle discusses the prob lems of understanding and translating the lingu istic and cult ural aspect of a foreign lite rary text. The article considers the trans lation process through the pr ism of cult ural orientation. In the process of transl ation, the nati onal cultural iden tity should be expressed to the max imum extent, through all me ans of expre ssion that include imagery and inton ation. In addi tion to the author's sty le, special atte ntion should al so be pa id to tro pes, phraseological uni ts, colloquial wo rds and dial&n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
ESTIMATION OF GENETIC VARIATIONS IN DIFFERENT TAXA IN BRASSICACEAE BY RAPD AND ISSR ANALYSIS
...Show More Authors

Twelve species from Brassicaceae family were studied using two different molecular techniques: RAPD and ISSR; both of these techniques were used to detect some molecular markers associated with the genotype identification. RAPD results, from using five random primers, revealed 241 amplified fragments, 62 of them were polymorphic (26%).

 

    ISSR results showed that out of seven primers, three (ISSR3, UBC807, UBC811) could not amplify the genomic DNA; other primers revealed 183 amplified fragments, 36 of them were polymorphic (20%). The similarity evidence and dendrogram for the genetic distances of the incorporation between the two techniques showed that the highest similarity was 0.897 between the va

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Financial Depth Measurements / Analytical Study in Selected Countries for the Period 1980-2008
...Show More Authors

This research deals with the most important indicators used to measure the phenomenon of financial depth, beyond the traditional indicators, which are called quantitative indicators, which is shown to be inadequate to show the facts accurately, but it may come in the results of a counterfactual, although reliable in econometric studies done in this regard.

Therefore, this research has sought to put forward alternative indicators, is the structural indicators, and financial prices, and availability of financial instruments, and cost of transactions concluded, in order to measure the phenomenon of financial depth.

After using and analyzing data collected from countries the research

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Petrophysical Analysis Based on Well Logging Data for Tight Carbonate Reservoir: The SADI Formation Case in Halfaya Oil Field
...Show More Authors

Carbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with h

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Oct 07 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Bacillus cereus in Meat Products: 16S rRNA Phylogenetic Tree analysis and Antimicrobial Investigation of Nisin A, Rosemary Essential Oil and Tetracycline
...Show More Authors

View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
The rule of leading the boy in prayer
...Show More Authors

God Almighty has imposed on us obligations and set limits on us, and among these obligations is the prayer, which is considered a pillar of Islam. And recently on the statement of its importance, and through extensive explanations, they elaborated on the statement of its pillars, its obligations, its Sunnahs, its rituals, and its bodies, and it is known that the imam in prayer is an important part of the parts of prayer. Whoever assumes this responsibility must be aware of these conditions, the most important of which is jurisprudence in religion, and there has been a disagreement between the jurists, especially the owners of the four schools of thought, about who is qualified to lead the imamate, and this is within many and wide details

... Show More
View Publication Preview PDF