|
This research sheds light on how press advertising affects consumer behavior and draws attention to it by identifying the factors that influence the intellectual perception process or attention to it. The aim of the research was to identify the factors that help achieve the objectives of the press announcement. The aim of the research was to identify the factors that help to achieve the objectives of the press announcement. The research problem was identified in four questions that were answered through a questionnaire distributed to a sample of students of College of Mass Communication, University of Baghdad. Do newspaper advertisements meet the readers’ need to search for the req |
Risk factors can be considered unique in construction projects, especially in tendering phase. This research is directed to recognize and evaluate the importance of critical risk factors in the tendering phase related to Iraq’s construction project. As a rule, construction projects are impacted by risk factors throughout the project life cycle; without identifying and allocating these risk factors, the project cannot succeed. In this paper, the open and closed questionnaires are used to categorize the critical risk factors in tendering phase. Research aims to recognize the factors that influence the success of tendering phase, to determine the correct response to the risk’s factors in this research article, (IBM, SPSS, V23) package has
... Show Moredance that reflect deferent sides from life human , in this search ensure for the causation can the expressionistic dancing be development acting actor in Iraqis theatre ? so this search concept of section one composed of the search problem , and important the search and need it , aimed the search , lines search it composed of the lines time , place , and lines subject , and the searcher ended this section with practical terms . Section tow – theatrical lines form that composed of part one the dance kinds: the expressionistic dancing, is very important in analyses the symbol .
... Show MoreThe purpose of the present study is to identify the comprehensive concept of desertion through the Holy Qur’an and to derive some educational implications related to the concept of desertion and its editing. The also aims to explain the images and forms of desertion. The researcher used the qualitative analytical method. The study concluded that the comprehensive concept of desertion was represented in moving from the country of polytheism to the country of Islam, singularity, alienation, and isolation, leaving, repelling and showing off, abandoning the wife in bed, and reciting from the Qur’an recitation, action, and arbitration, insulting, abandoning, delirium, intersection, and manipulation. The researcher has drawn many education
... Show MoreReceipt date: 12/28/2020 accepted date: 20/1/2021 Publication date: 12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
Russia has emerged as a rising and influential power in the international arena, especially with Vladimir Putin's assumption of power and his desire for the rise of Russia and the end of the "unipolarism" represented by the hegemony of the United States of
... Show MoreThe research attempts to identify the pattern of punctuation in contemporary Iraqi poetry through delving into the poetry of an Iraqi poet belonging to the seventieth generation, Namik Abdul Deeb, who belongs to the poets of Arab modernity in general, the research has reached many results, including that the signs of deletion were vocabulary marks any They are located in the center of the poetic singular, or inline markers, which are those that fall within the poetic line of the prose poem separating its vocabulary, or cross-sectional marks located within the poetic passages that are part of the poetic text, and finally text marks which are located within the poetic text and fragmented into Parts. The research also found that the work of
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreRecently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and s
... Show More
