The current research aims to diagnose the type and level of influence of social media, whose dimensions are represented by (attitudes towards social media marketing, knowledge and use of social media, influence on the Internet and social media, following up on social media) on customer behavior in its dimensions (attracting attention, raising Interest, desire creation, customer response), and the research sought to answer questions related to the research problem by testing the main hypotheses to explore correlations and influence between the two variables, and to achieve research hypothesis tests, the field study was used, as the research sample reached (135) individuals from the director and the assistant director And marketing personnel in tourism companies in Baghdad, and the questionnaire was used as a tool to collect data and information and was prepared by the researcher after undergoing validity, stability and arbitration tests, as well as the use of observation and field presence of the researcher, and the data were analyzed using the statistical program (SPSS v.25, AMOS. v.23) In addition, a number of statistical methods have been used to process the data, represented by the arithmetic mean, standard deviation, and the coefficient of the difference, the correlation coefficient (Person), and the multiple linear regression equation, and the research showed significant results represented by a strong positive direct relationship between the two variables of the research. On the research variables, and the conclusion of the research was a set of recommendations, the most prominent of which is the need for the companies researched to focus on marketing services through social media, and they must know the needs and desires of customers by studying and accurate information on what the customer wants, and the need for companies to communicate continuously with customers to maintain the achievement of a superior site Competitors.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThere has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
In this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
In vitro tests have been carried out to find out the efficacy of watery extracts of garlic Allium sativum and hot pepper Capsicum spp. against the trophozoites of Entamoeba histolytica cultivated in liver infusion agar media at 37 c . The doses of ( 0.01, 0.05 ,0.1, 0.5, 1 ml )of garlic and hot pepper watery extracts were added to certain number of E. histolotica trophozoits for exposure time of 24 hrs., the mortality percentage of trophozoites treated with garlic extract were ( 14.82 %, 31.05% ,46.16% , 64.29% , 92.7%) respectively , these percentages were very close to that obtained from the treatment with the hot peper extract which were (17.86%, 32% , 44% ,66.67% ,100%) respectively . Generally these results showed that the ga
... Show MoreObjective: To identify the role and importance of the clinical pharmacist in the Emergency Department on prevent
or reduced the medication error.
Methodology: We collected the medical file of 3400 patients, 1400 patient's file in (A) hospital, and 1000 patient's
file in each of (B and C) hospital, who admitted to the ED, at primary weekdays between 8 am to 2 pm, and
recorded all the intervention made by clinical pharmacist through an active search in clinical charts, with analysis
of the daily medical prescription. The potential severity of harm of the medication error judged by two reviewers,
a permanent emergency physician, and clinical pharmacist based on the National Coordinating Council (NCC) of
Medication Error
This study aimed to detect antibiotics in water, particulate, plant, and sediment in the Tigris River within Baghdad City, in addition to their spatiotemporal variations, and related physicochemical parameters. Five sites were selected in the river. Three target antibiotics (tetracycline, gentamycin, and ciprofloxacin) were detected in water, particulate, plant, and sediment of the river at all selected sites. The results clearly showed that the concentrations of target antibiotics were sediment > water > plant > particulate. Site 3 is considered as a risk site where high concentrations of all antibiotics during the wet and dry seasons wer