Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i
The aim of this study is to design a proposed model for a document to insure the mistakes of the medical profession in estimating the compensation for medical errors. The medical profession is an honest profession aimed primarily at serving human and human beings. In this case, the doctor may be subject to error and error , And the research has adopted the descriptive approach and the research reached several conclusions, the most prominent of which is no one to bear the responsibility of medical error, although the responsibility shared and the doctor contributes to them, doctors do not deal with patients according to their educational level and cultural and there are some doctors do not inform patients The absence of a document to insu
... Show MoreInherent fluctuations in the availability of energy from renewables, particularly solar, remain a substantial impediment to their widespread deployment worldwide. Employing phase-change materials (PCMs) as media, saving energy for later consumption, offers a promising solution for overcoming the problem. However, the heat conductivities of most PCMs are limited, which severely limits the energy storage potential of these materials. This study suggests employing circular fins with staggered distribution to achieve improved thermal response rates of PCM in a vertical triple-tube heat exchanger involving two opposite flow streams of the heat-transfer fluid (HTF). Since heat diffusion is not the same at various portions of the PCM unit,
... Show MoreThe structural, optical properties of cupper indium gallium selenite (CuIn1-xGaxSe) have been studied. CuIn1-xGaxSe thin films for x=0.6 have been prepared by thermal evaporation technique, of 2000±20 nm thickness, with rate of deposition 2±0.1 nm/sec, on glass substrate at room temperature. Heat treatment has been carried out in the range (373-773) K for 1 hour. It demonstrated from the XRD method that all the as-deposited and annealed films have polycrystalline structure of multiphase. The optical measurement of the CIGS thin films conformed that they have, direct allowed energy gap equal to 1.7 eV. The values of some important optical parameters of the studied films such as (absorption coefficient, refractive index, extinction coeffici
... Show MoreBackground: Polishing technique for acrylic resin material have great effect on properties of acrylic material and bacterial colonization such as staphylococcus aurous, which are responsible for many acrylic prosthetic infections such as the commonly ocular infections. Ineffective polishing technique could affect roughness and subsequently porosity of acrylic materials.So, a new effective method for polishing acrylic was used depending on the use of optiglaze coating material. So, this study aimed to evaluate the effect of optiglaze polishing on porosity of acrylic resin material and staphylococcus aurous activity in comparison to conventional polishing technique.
Materials and methods: Specimen(n=120) were prepared :20 spe
... Show MoreDeep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d
... Show MoreThermal conductivity measurement was done for specimens of Polystyrene/ titanium dioxide, Polycarbonate/ titanium dioxide and Polymethylmetha acrylate/ titanium dioxide composites for weight ratio of 1.9/ 0.1 and 1.8/ 0.2 wt% for different thickness of the samples. The experimental results show that the thermal conductivity is increased with the increasing of thickness of layers and with the weight ratio of TiO2
The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More