Embracing digital technological advancements in media and communication has led government entities to adopt communication practices fully aligned with the digital and networked system in government communication. Traditional media practices within the government environment increasingly rely on the ability to utilize digital tools and systems for content creation, communication, evaluation, and the management of the entire communication process within an electronic and intelligent framework for government services. Naturally, this transformation has caught the attention of communication and public relations researchers worldwide, as the digital and networked aspects of government communication now form an intellectual and theoretical dimension that cannot be underestimated in studying government communication practices.
Industries copper a craft that requires precision and patience great in the processes of industrialization and execution of product launches brass designs and a variety of forms , and the goal of research into the possibility of the use of modern technologies in the development of industries copper local , and identifies research study models of industries copper local to the city of Baghdad , and are available in the markets for the period from (200 - 2011) , Chapter II Multi industries copper local and technical in the copper industry , and after analysis models the sample was the most important conclusions : can work forms a multi- product copper formations deep or window using the technique work motifs and patterns. - formations deco
... Show MoreThis research aims at highlighting the strategic role of human resource development in developing competitive advantage in light of the great challenges and rapid changes witnessed in recent years in the business world. The human element is the main engine of the organization's resources, especially when it possesses the skill quality and cognitive abilities commensurate with the nature of work. Therefore, this research focuses on the importance of human resources development strategy in contemporary organizations and reviews the summary of literature and theoretical foundations related to human resources development, as well as various philosophical concepts related to the competitive advantage and to indicate the important role
... Show MoreNegotiations in administrative contracts represent an important preparatory stage in which discussions and discussions between the administrative authority and the party wishing to contract with them will be held on one of the issues related to the contract to be concluded whereby the different views of the parties of the contractual relationship are brought together to exchange or achieve common interests.
The importance of negotiations in administrative contracts and their significant and effective role in protecting state funds. The inadequacy of Iraqi legislation in the development of an integrated legal framework for this important phase, and the many problems that appear in this stage before the conclusion of the cont
... Show MoreAccording to the theory of regular geometric functions, the relevance of geometry to analysis is a critical feature. One of the significant tools to study operators is to utilize the convolution product. The dynamic techniques of convolution have attracted numerous complex analyses in current research. In this effort, an attempt is made by utilizing the said techniques to study a new linear complex operator connecting an incomplete beta function and a Hurwitz–Lerch zeta function of certain meromorphic functions. Furthermore, we employ a method based on the first-order differential subordination to derive new and better differential complex inequalities, namely differential subordinations.
This paper is interested in certain subclasses of univalent and bi-univalent functions concerning to shell- like curves connected with k-Fibonacci numbers involving modified Sigmoid activation function θ(t)=2/(1+e^(-t) ) ,t ≥0 in unit disk |z|<1 . For estimating of the initial coefficients |c_2 | , |c_3 |, Fekete-Szego ̈ inequality and the second Hankel determinant have been investigated for the functions in our classes.
The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.
This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re
... Show MoreIn this research, optical communication coding systems are designed and constructed by utilizing Frequency Shift Code (FSC) technique. Calculations of the system quality represented by signal to noise ratio (S/N), Bit Error Rate (BER),and Power budget are done. In FSC system, the data of Nonreturn- to–zero (NRZ ) with bit rate at 190 kb/s was entered into FSC encoder circuit in transmitter unit. This data modulates the laser source HFCT-5205 with wavelength at 1310 nm by Intensity Modulation (IM) method, then this data is transferred through Single Mode (SM) optical fiber. The recovery of the NRZ is achieved using decoder circuit in receiver unit. The calculations of BER and S/N for FSC system a
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More