the digital public relations aim at make the workers getting the necessary information about the governmental institutions where they work and the enveronment surrounding them. it also tries to let the workers get the special knowlege of tthe publich relations and their jobs like the works of planning , arranging the active communication and executive skills needed in their writing , editing , special art skills for designing , production and technological skills to deal with the computer.
the problem of the research includes some questions as :
1- what are the uses achieved by degetal public relations workers at Iraqi universities (Baghdad, Mustansiriya, and Iraqi)
2- what are the tools used to apply digital public relations in active communication at Iraqi universitites?
The goals of the research are as follows:
Identifying the extent to which employees use digital public relations according to the theory of uses and saturation .
identifying the extent to which employees’ dependence on the tool of applying digital public relations
the researcher ends with the following conclusions:
1- the number of male respondents are larger than the females. their age is abut 20 years up to 30 years old . the educational level of the respondents who have bahelor degree are larger than those who have higher degrees. The university of Baghdad is higher in the number of workers in the departments of digital public relaions.
2- the number of those who know how to use the internet and computer system increases in number year after another.
The research explain the developments in the structure of government Expenditure for the period (1990-2014), this period include tow different periods in terms of the conditions, the first period (1990-2002)characterized by imposing the economic sanctions and deny the Iraqi economy from the oil revenues, while the second period (2003-2014) marked by abundance resource rents as a result of lifting the ban on oil exports, (autoregressive Distributed lag Model) has been used to measure the impact of government Expenditure in both side current and investment in the oil-GDP (gross domestic product) and non oil-GDP, the stady found that there is no significant relationship between current Expenditure in non-oil and oil-GDP in bo
... Show MoreThe revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreThe investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .
&nb
... Show Moreتبنت العديد من المؤسسات الأكاديمية التعلم الإلكتروني منذ سنوات ، وقد أثبت فاعليته في كثير من هذه المؤسسات لاسيما تلك المهتمة بتعلم اللغات الاجنبية. الا انه مع انتشار جائحة كورونا اصبح التعليم الالكتروني ضرورة ملحة في الجامعات في جميع أنحاء العالم ، بما في ذلك الجامعات العراقية. تهدف الدراسة الحالية إلى تقصي أثر هذا الوباء على التعلم الإلكتروني في أحدى الكليات العراقية . يفترض الباحث أن تقبل ال
... Show MoreThe research dealt with two variables first in the field of human resources represented by the empowerment of workers and second in operations through improved process in the framework of standards Quality Award European containing nine basic criteria (Leadership, Strategy, partnerships and resources, the results of the individuals, the results of the customer, the results of the community), including human resources and operations has been selected and the Ministry of Industry and Minerals as a community to search , which covered most of the industrial sectors of Iraq through the selection of a single company of every industrial sector and thus became the research sample (6 ) industrial companies in addition to the C
... Show MoreIn the current research work, a system of hiding a text in a digital grayscale image has been presented. The algorithm system that had been used was adopted two transforms Integer Wavelet transform and Discrete Cosine transformed. Huffman's code has been used to encoding the text before the embedding it in the cover image in the HL sub band. Peak Signal to Noise Ratio (PSNR) was used to measure the effect of embedding text in the watermarked image; also correlation coefficient has been used to measure the ratio of the recovered text after applying an attack on the watermarked image and we get a good result. The implementation of our proposed Algorithm is realized using MATLAB version 2010a.
The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreBioethanol production from sugar fermentation is one of the most sustainable alternatives to substitute fossil fuel. production of bioethanol from low grade dates which are rich of sugars. An available sugar from a second grade dates (reduction sugar) was 90g/l in this study. Sugar can be served as essential carbon sources for yeast growth in aerobic condition and can also be converted to bioethanol in anaerobic condition. The effect of various parameters on bioethanol production, fermentation time, pH-values, inoculum size and initial sugar concentration were varied in order to determine the optimal of bioethanol production. The highest bioethanol yield was 33g/l which was obtained with sugar concentration 90 g/l, inocu
... Show More