Embracing digital technological advancements in media and communication has led government entities to adopt communication practices fully aligned with the digital and networked system in government communication. Traditional media practices within the government environment increasingly rely on the ability to utilize digital tools and systems for content creation, communication, evaluation, and the management of the entire communication process within an electronic and intelligent framework for government services. Naturally, this transformation has caught the attention of communication and public relations researchers worldwide, as the digital and networked aspects of government communication now form an intellectual and theoretical dimension that cannot be underestimated in studying government communication practices.
The research aimed to prepare muscle elongation exercises for the arms with high intensity in which the training methods for young blind fencers vary, and to identify the effect of the diversity of muscle elongation exercises for the arms with high intensity on the cellular basal efficiency (lactic acid and sodium bicarbonate) and pulmonary respiration for young blind weapon fencers in terms of sports technology, and the experimental approach was adopted by designing the experimental and equal control groups, and the limits of the research community were represented by young fencers with shish weapon under the age of (20) years in the Army Sports Club, whose number is Total (15) swordsmen, continuing their training for the sports season (20
... Show MoreThe current study aims to test the impact of green training and development on sustainable performance and explore its effects within and outside the Iraqi Ministry of Environment. The main research problem revolves around the question of the extent of implementing green training and development and sustainable performance in the ministry (What is the nature of the relationship between green training and development and sustainable performance in the ministry?). To clarify the relationship between the research variables, two main hypotheses were formulated along with sub-hypotheses. The study also aims to assess the level of the ministry's interest in the research variables and provide key recommendations to enhance sustainable performan
... Show MoreThe financial violation must be defined as a concept for the purpose of distinguishing this concept from other terms that may be suspected in the context of the job and the violations of the financial employee that may be disciplinary or even punitive. From Egypt and Iraq, in addition to addressing the doctrinal aspect in the two countries above and the extent to which the specialized jurists dealt with the statement of financial violations, or even highlighting images that could be considered that the violation committed by the financial employee falls under the framework of the financial violation. Which may result in a financial violation by the financial employee, and we touched upon the request of him to indicate the financial viola
... Show MoreResearch indicates that the second half of the twentieth century marked large interests in the service industry by government and private organizations in that one, and the service industry has become the bedrock of plans in achieving economic and social development. From this standpoint felt specialists and researchers the importance of transport modes, including rail, which should be available between Almnltq Civil populated as services organized by the competent authorities to achieve the active participation of citizens in economic and social development in the region and that the term services means economic activities, which are the results Pollack concrete such as accepting the situation and satisfaction them or satisfacti
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreThe research aims to
1 – The discloser of the level of moral values in the children of kindergarten.
2 - Building an educational program designed to develop moral values on the children of kindergarten.
3 - Knowing the impact of the program in the development of moral values in children
Purposive sample was selected consisted of 40 children and a child aged 5-6 years and to achieve objectives of the research promising measure of the moral values kindergarten has been applied to the children of the two groups was based on pre and post test
Background: Data on SARS-CoV-2 from developing countries is not entirely accurate, demanding incorporating digital epidemiology data on the pandemic.
Objectives: To reconcile non-Bayesian models and artificial intelligence connected with digital and classical (non-digital) epidemiological data on SARS-CoV-2 pandemic in Iraq.
Results: Baghdad and Sulaymaniyah represented statistical outliers in connection with daily cases and recoveries, and daily deaths, respectively. Multivariate tests and neural networks detected a predictor effect of deaths, recoveries, and daily cases on web searches concerning two search terms, "كورونا" and "Coronavirus" (Pillai's Trace val
Introduction: Although soap industry is known from hundreds of years, the development accompanied with this industry was little. The development implied the mechanical equipment and the additive materials necessary to produce soap with the best specifications of shape, physical and chemical properties. Objectives: This research studies the use of vacuum reactive distillation VRD technique for soap production. Methods: Olein and Palmitin in the ratio of 3 to 1 were mixed in a flask with NaOH solution in stoichiometric amount under different vacuum pressures from -0.35 to -0.5 bar. Total conversion was reached by using the VRD technique. The soap produced by the VRD method was compared with soap prepared by the reaction - only method which
... Show MoreRecently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul
... Show MoreBackground: Colorectal cancer (CRC) represents the second most common malignancy and the fourth most common cause of cancer deaths. CRC can manifest early with bright red bleeding per rectum, tenesmus, and altered bowel habits. These symptoms are often attributed to benign lesions, including anal fissure. Our objective is to highlight the alarming scenario of an anal fissure masking the clinical features of an underlying colorectal cancer in healthy middle-aged patients.
Case Report
Our case report aims to discuss how congruent clinical features of benign-looking anal fissure can delay the diagnosis of rectal cancer. In January 2019, a healthy forty-four years old Iraqi male with no famil
... Show More