تشهد الساحة الاعلامية في وقتنا الحاضر تطورات سريعة وبشكل متزايد سواء في طريقة صناعة الرسالة الاعلامية او اسلوب تقديمها وعرضها ،وفي ظل تعدد وتنوع وسائل الاعلام الجديد والزخم الاعلامي الذي يتعرض له المستخدم فيجد نفسه وسط كم هائل من الاخبار متعددة المصادر والاشكال ، فكيف له ان يميز بين المعلومة الصادقة والزائفة ؟ ومادرجة ثقته بتلك المعلومات والمواقع الالكترونية ؟ ويهدف البحث الى الكشف عن مدى توفر عناصر صناعة المحتوى الاعلامي واختبار العلاقة بينها وبين مستويات ثقة الجمهور بالمواقع الالكترونية؟ ويعد البحث من البحوث الوصفية التي تسعى الى رصد مستويات ثقة الجمهور بالمواقع الالكترونية وتحديد عناصر صناعة المحتوى الاعلامي الذي يتمتع بدرجة مصداقية عالية لدى الجمهور عبر استخدام المنهج المسحي ويتمثل مجتمع البحث بالجمهور من مستخدمي المواقع الالكترونية وحددت عينة قصدية من المبحوثين الذين يتعرضون الى الاخبار عبر المواقع الالكترونية وللوصول الى المستخدمين استخدمت الباحثتان عينةكرة الثلج عبر استخدام اداة الاستبانة لتحقيق اهداف البحث وفروضه والتي اشتملت على محاور عدة تحاكي تساؤلات البحث وفروضه واهدافه .
Humans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.
The purpose of this research is to study the quality of scientific research at the University of Baghdad in light of scientific piracy and plagiarism of research and results and attribute it to others intentionally or unintentionally. Proactive writing such as stealing ideas or synthesizing the results of one another over others and its negative impact on the quality of scientific outputs and the reputation of educational organizations through an exploratory study in the faculties of the University of Baghdad, scientific and humanitarian. As for the aims of the study, it was determined by determining the negative impact of piracy on scientific research. A Likert five-point scale was used in this research. The research community c
... Show MoreRNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce
... Show MoreThis research delves into the role of satirical television programs in shaping the image of Iraqi politicians. The research problem is summarized in the main question: How does satire featured in television programs influence the portrayal of Iraqi politicians? This research adopts a descriptive approach and employs a survey methodology. The primary data collection tool is a questionnaire, complemented by observation and measurement techniques. The study draws upon the framework of cultural cultivation theory as a guiding theoretical foundation. A total of 430 questionnaires were disseminated among respondents who regularly watch satirical programs, selected through a multi-stage random sampling procedure.
Th
مشكلة البحث
وتعد مرحلة المراهقة من اصعب المراحل التي يمر بها الفرد واخطرها اذ يطلق عليها بمرحلة التفكير المجرد ، وهي مرحلة حاسمة في حياته اذ تتكون لديه معالم الشخصية .أنهم خزين الامة الحقيقي من الطاقات الحيوية التي لا تنضب لذا يجب الاهتمام بهذه الشريحة من المجتمع وتطويرهم وتوجيههم لاسلم الطرق للحفاظ على مستقبلهم ومستقبل الا
... Show MoreThe aim of this research is to demonstrate the impact of credit risk on the banks of the study sample on the granting of loans and credit facilities, and try to reduce the size of credit risk to banks as a result of granting loans and credit facilities, credit risk is the oldest form of risk in financial markets. Every financial institution takes a degree of risk when it gives loans and credit facilities to companies and customers, It is exposed to financial losses when some borrowers fail to repay their loans as agreed, and at the same time credit facilities are the most profitable operations of the bank as it is the most profitable banking operations than other operations, so it represents the research communit
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show More