يتناول هذا البحث موضوع مهم في تاريخ العراق في العهد الملكي يتمثل في الانقلاب العسكري الذي قام به عدد من قادة الجيش العراقي بقيادة الفريق بكر صدقي رئيس أركان الجيش العراقي سنة 1936م وتم تشكيل حكومة من الانقلابيين استمرت حوالي تسعة أشهر وكتب عنها الكثير بعض هذه الكتابات كانت مع الانقلاب وبعضها كانت ضده وجاء هذا البحث ليسلط الضوء على ألصوره الذهنية التي حاولت ان ترسمها الصحف العراقية في حينها وتم دراسة الموضوعات التي تتحدث عن الانقلاب في واحده من أهم الصحف العراقية في ذالك الوقت وهي جريدة الأهالي التي كانت تصدر عن جماعة الأهالي وهي جريده يوميه سياسيه جامعة صاحبها ومديرها المسؤول المحامي عبد القادر اسماعيل كما جاء في ترويسة الجريدة وجاء هذا البحث في ثلاثة محاور تناول المحور الاول الإطار المنهجي واشتمل عل مشكلة البحث وأهميته وأهدافه والمنهج المستخدم فيه وأدوات وطرائق البحث العلمي وعينة البحث . اما المحور الثاني فكان الاطار النظري للبحث حيث قام الباحث فيه بوصف متغيرات البحث الاساسيه وهي الصورة الذهنيه حيث اشتمل على تعريف الصورة الذهنيه حيث تناول الباحث عدد من التعريفات التي تناولها الخبراء والباحثين في مجال الصورة كما تناول وظائف الصورة الذهنيه وخصائصها وعوامل بنائها وتناول ايضا وسائل الاعلام وبناء الصورة الذهنيه كما تناول المحور الثاني وصفا كاملا للانقلاب حيث شمل نبذة عن حياة بكر صدقي والاعداد للانقلاب وتنفيذه وتشكيل حكومة من الانقلابين وحل المجلس النيابي ومقتل بكر صدقي اما المحور الثالث فتضمن الاطار التحليلي حيث شمل تحليل موضوعات الانقلاب في جريدة الاهالي والبالغه(260) موضوعا تراوحت بين الاتجاهات السياسية والاجتماعية والوضع الاقتصادي والوضع الثقافي والتعليمي والوضع العسكري وفي النهاية توصلت الدراسة الى عدد من الاستنتاجات في ضوء نتائج التحليل التي تناولها المحور الثالث.
The research aims to demonstrate the impact of internal audit in Iraqi economic units on enhancing social performance reports, through the statistical models used, as a survey list (for the independent variant) of the search, which contains five axes of each axis, contains a set of The questions were prepared on the basis of the standards issued by the Institute of Internal Auditors (IIA) and were distributed to a sample of internal auditors, as for (for the approved variable) the researcher obtained numerical data represented by the financial statements of the research sample and used statistical models such as model (Kolmakrov-Smirnov) is a good match (goodness of fit) which assumes that the data is distributed naturally as wel
... Show MoreInsurance actions has become a task of the vital foundations on which the international economy depends, where its presence helped in the development of economic resources in which human resource is considered the most important of these resources. Insurance companies play the biggest role in protecting this resource and minimizing the impact of the dangers that verify this condition.Human has worked hard to get rid of the dangers and its harm, and to devise many ways to prevent them. A risk management is considered within human’s creations in order to create a society with fewer negative risks impacts.
On this basis, th
... Show MoreIn recent decades, the world has faced some rapid technical developments, affected on many fields of life, which had the best chance in the information and communication technology, such that it created an entirely new situation, summed up the life and development of business enterprises. This is while these developments have changed a lot the reputation of management institutions and civil society organizations in return. In addition, they have linked the citizen and those institutions in their different specialties within a distinct electronic format called e-management in the contemporary literature.
This study attempted to highlight the importance of investment in building e-management by linking citiz
... Show MoreThis research aimed to definite Blending learning (BL) technique, and to know the impact of its use onacademic achievement in Biology course of second class students in secondary special schools in Omdurman Locality and attitudes towards it, to achieve this; researcher adopted the experimental method. The sample was selected of (41) students, chosen from Atabiyah school, were divided into two equals groups: one experimental group reached (26) students studied by using the BL technique, and the second control group (25) students have been taught in the traditional method.
Data has collected by using two tools: achievement test and a questionnaire for measuring the attitudes towards Blend
... Show MoreAbstract
The purpose of this research is to develop a proposed framework for achieving the Integration of the Target Cost and Resource Consumption Accounting Techniques and to show the role they play in reducing products costs and supporting the competitive advantage to cope with contemporary changes. To achieve this goal, the researchers followed the analytical method using the statistical questionnaire as a means of collecting data from the research sample include accounting, administrative, technical, engineering staffs and others. The research sample consists of (56) individuals and for the purpose of conducting statistical analysis of the data and testing hypotheses, the statistical program (SPSS) wa
... Show MoreThe topic of the research dealt with the image of Iraq in the British press based on a sample of the newspapers (The Guardian and the Daily Telegraph), which are among the most important and largest newspapers in the United Kingdom and the world, because of its active role in guiding local and international public opinion towards important issues and events, Since these two newspapers are interested in the accuracy of sensitive political topics, the message aimed at knowing the media image that these two newspapers painted about Iraq in the period that was limited to the first quarter of 2019, and also to know the nature of the contents promoted by these newspapers about the Iraqi reality, The method of content analysis was used as an ap
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreSome degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f
Abstract Since 2003. Iraq has begun a new phase in its modern history, which was after a long period of tyranny, repression of freedom of expression, and women were no better off than men; they suffered marginalization and exclusion, but after the fall of the former regime and the adoption of a parliamentary system of government, The level of participation in the government; where it approved the share of women in the legislative authority called "quota" which reflects the legislative level of a certain proportion of the seats in Parliament, amounting to 25%, and this is approved by the Iraqi constitution for 2005. But it is noticeable that women in parliament did not work within the quota; in other words they belonged to the pol
... Show More