The current research aims to diagnose the type and level of influence of social media, whose dimensions are represented by (attitudes towards social media marketing, knowledge and use of social media, influence on the Internet and social media, following up on social media) on customer behavior in its dimensions (attracting attention, raising Interest, desire creation, customer response), and the research sought to answer questions related to the research problem by testing the main hypotheses to explore correlations and influence between the two variables, and to achieve research hypothesis tests, the field study was used, as the research sample reached (135) individuals from the director and the assistant director And marketing personnel in tourism companies in Baghdad, and the questionnaire was used as a tool to collect data and information and was prepared by the researcher after undergoing validity, stability and arbitration tests, as well as the use of observation and field presence of the researcher, and the data were analyzed using the statistical program (SPSS v.25, AMOS. v.23) In addition, a number of statistical methods have been used to process the data, represented by the arithmetic mean, standard deviation, and the coefficient of the difference, the correlation coefficient (Person), and the multiple linear regression equation, and the research showed significant results represented by a strong positive direct relationship between the two variables of the research. On the research variables, and the conclusion of the research was a set of recommendations, the most prominent of which is the need for the companies researched to focus on marketing services through social media, and they must know the needs and desires of customers by studying and accurate information on what the customer wants, and the need for companies to communicate continuously with customers to maintain the achievement of a superior site Competitors.
Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
The current search aims to identify First: To measure the level of authoritarian personality among the students of the sample as a whole. Second: Measurement of differences in the level of authoritarian personality among students in the middle school according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Third: the level of control site level among the students of the sample as a whole. Ra'aa: Measurement of differences in the level of the control site among junior students according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Fifth: Explain the relationship between the authoritarian personality and the locus of control among the students of the research sample.
... Show MoreLongitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.
In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.
The longitudinal balanced data profile was compiled into subgroup
... Show MoreThis study was done in Baghdad teaching Hospital by using developed instrument type GIOHO and included a number of patients with compressed breast thickness (7,8,9,10)cm .
The relationship between radiation dose and breast thickness was linear. All results were compared with the international standered values that measured by the International Nuctear Agency and Europeon sources ,it was found that it is in consistance or has a little difference .
The study showed that the mean absorbed dose may be determined by using TLD measurement below 10 mGy and the glandular dose was (1.45 mGy) and this can not b
... Show MoreThe most important function of a prosthetic hand is their ability to perform tasks in a manner similar to a natural hand, so it is necessary to perform kinematic analysis to determine the performance and the ability of the prosthetic human finger design to work normally and smoothly when it's drive by two sets of links that embedded in its structure and pulled by a servomotor, so the Denvit-Hartenberg method was used to analyse the forward kinematics for the prosthetic finger joints to deduction the trajectory of the fingertip and the velocity of the joints was computed by using the Jacobian matrix. The prosthetic finger was modelled by the Solidwork - 2018 program and the results of kinematics were verified using MATLAB. The analys
... Show MoreIn this research, our aim is to study the optimal control problem (OCP) for triple nonlinear elliptic boundary value problem (TNLEBVP). The Mint-Browder theorem is used to prove the existence and uniqueness theorem of the solution of the state vector for fixed control vector. The existence theorem for the triple continuous classical optimal control vector (TCCOCV) related to the TNLEBVP is also proved. After studying the existence of a unique solution for the triple adjoint equations (TAEqs) related to the triple of the state equations, we derive The Fréchet derivative (FD) of the cost function using Hamiltonian function. Then the theorems of necessity conditions and the sufficient condition for optimality of
... Show Morethe research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.
To achieve this goal, the researcher has built a list of criteria according to the following steps:
First - identify the key areas covered by the whole list which are:
1 – Standards of system building and implementing with the operating screens.
2 – Standards of display forms including audio and video presentation.
3 – Standards which are related to the program philosophy.
4 - Standards which are related to the program objectives.
... Show MoreThe problem of finding the cyclic decomposition (c.d.) for the groups ), where prime upper than 9 is determined in this work. Also, we compute the Artin characters (A.ch.) and Artin indicator (A.ind.) for the same groups, we obtain that after computing the conjugacy classes, cyclic subgroups, the ordinary character table (o.ch.ta.) and the rational valued character table for each group.