The research aims to identify and diagnose the public relations strategies in its digital online communications by the United Nations High Commissioner for Refugees (UNHCR) in managing the crisis of Iraqi refugees in Turkey. A content analysis form was designed for the digital content of the UNHCR's website dedicated to topics and issues concerning Iraqi refugees that were covered by the site, adopting a comprehensive enumeration approach. The study covered the period from 01/03/2022, to 30/06/2022. The research yielded several key findings, including the predominant use of media, advertising, and education strategies in managing the crisis of Iraqi refugees in Turkey. News and reports ranked first among the media arts used in public relations. There is evident cooperation between the public relations departments of the UNHCR and the Iraqi embassy in Turkey in managing political crises.
Background: Low back pain is the most common health problem in men and women between the ages of 20 and 50 years. The lumbar disc prolapse has a major role in this condition. Treatment is either conservative or surgical. The most common surgical interventions are either laminectomy or interlaminar approach.
Objective: To determine which is the best surgical approach for the patient according to his/her type of disc herniation.
Patients and methods: A comparative clinical study conducted in the Neurosciences Hospital, Baghdad, Iraq from January 2016 to January 2018. In this paper we evaluated the clinical outcome following both approaches
Results:
... Show Moreيعد نظام الادارة البيئية (Environmental Management System)، والذي يرمز له أختصاراً ( EMS ) ، أحد الاسس المهمة التي تمكن المنظمة من السيطرة الفاعلة على مستوى الاداء البيئي المتميز للمنظمات، فهو يطبق مواصفات قياسية خاصة بالمراجعة الموضوعية، ويوفر هيكلاً وطريقة لتطبيقها في جميع نواحي العمل، وبما يضمن الوفاء الكامل للمتطلبات والتشريعات والقوانين البيئية التي تنسجم مع رغبات المجتمع و ت
... Show MoreThe revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC
... Show MoreThe existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
ان السبب الرئيسي لاختيار الموضوع كونه من الاساليب الادارية الحديثة التي تهدف الى انجاح المنظمة او الشركة المبحوثة, اذ تمثلت مشكلة البحث في ما دور الادارة بالرؤية المشتركة في تعزيز التسويق الابداعي بالشركة المبحوثة, يهدف البحث الى تسليط الضوء على مفهوم الادارة بالرؤية المشتركة وانعكاساتها على التسويق الابداعي للمنظمة ، باعتبارها منهج اداري حديث يسهم في تغيير وتجديد وتطوير واقع المنظمة المبحوثة( الشرك
... Show MoreThis research provides a study of the virtual museums features and characteristics and contributes to the recognition of the diversity of visual presentation methods, as the virtual museums give the act of participation and visual communication with programs at an open time, so that it would contribute to reflection, thinking and recording notes, developing the actual and innovative skills through seeing the environments. The study has been divided into two sections the first one is virtual museum techniques. The techniques were studied to reach the public and are used remotely by the services of personal computers or smart phones being virtual libraries that store images and information that was formed and built in a digital way and how
... Show Moreتبنت العديد من المؤسسات الأكاديمية التعلم الإلكتروني منذ سنوات ، وقد أثبت فاعليته في كثير من هذه المؤسسات لاسيما تلك المهتمة بتعلم اللغات الاجنبية. الا انه مع انتشار جائحة كورونا اصبح التعليم الالكتروني ضرورة ملحة في الجامعات في جميع أنحاء العالم ، بما في ذلك الجامعات العراقية. تهدف الدراسة الحالية إلى تقصي أثر هذا الوباء على التعلم الإلكتروني في أحدى الكليات العراقية . يفترض الباحث أن تقبل ال
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreIn the current research work, a system of hiding a text in a digital grayscale image has been presented. The algorithm system that had been used was adopted two transforms Integer Wavelet transform and Discrete Cosine transformed. Huffman's code has been used to encoding the text before the embedding it in the cover image in the HL sub band. Peak Signal to Noise Ratio (PSNR) was used to measure the effect of embedding text in the watermarked image; also correlation coefficient has been used to measure the ratio of the recovered text after applying an attack on the watermarked image and we get a good result. The implementation of our proposed Algorithm is realized using MATLAB version 2010a.