This study aims to deliver the woman’s image and to unveil on how to be introduced in the TV series. The research is based on the survey method-using content analysis tool. The research sample represented in the TV series produced by the IMN, which were displayed in 2014 and used the pattern of Margaret Gallagher to analyze the content of the series in accordance with the frame analysis theory.
The study came up with declination of the woman’s representation compared with man in Iraqi TV drama, also the study finds that the series introduced the woman according to the personal, social, political, and economic frames in a standardizing method. It focuses on the characteristics always attributed to it as showing her obedient of the social role and restrained with the customs and traditions and relies on the man and her goals are related with the man except few roles, which bracken such routine.
Abstract (Iraq post – war reconstruction strategy: analytical study in fact and future prospects.) There search aims at identifying the causes of internal instability in Iraq from the political ,economic , social and security aspects , to diagnose the imbalance and to work towards finding real solutions to this . The study also aims at identifying the reconstruction proposals to completely eliminate the organizationof the terrorist advocate, as well as to know. theproblem of research lies in the ability of Iraqi political elites to achieve internal stability and to employ reconstruction proposals at all levels . The hypothesis of the research lies in the equation that the process of building stability (political – economic)and (socia
... Show MoreThe study seeks to identify e-governance requirements in human resources management, which are (administrative requirements, technical, human, financial, and security) which is a new style differs from the traditional management pattern, where work depends on multiple forms and methods of Tools, (e. g. computers and various electronic software), by relying on powerful information systems that help to make management decisions as quickly and less effortless and less expensive to keep up with the tremendous technological advancements in the field of information and communication technology revolution.
The sample included 132 Person who constitute a position (Director General, assistant Director General, section managers and d
... Show Morecontent Analysis for Some Type of Pillows used in Iraqi houses
This study aims to isolate the pathogenic yeasts from genital tract and investigate their relationship with the age .The results clarified that the most pathogenic yeast isolated from genital tract was Candida albicans , also the results of C.albicanas isolates susceptibility test, to different antifungal revealed that they were sensitive to Miconazole, Ketoconazole and Clotrimazol and were resistant to Nystatin and Grisofulvin. The study of relationship of vaginal infection with the age showed that the incidence of infection with Candida was high among females age group (19-39 years).
Abstract
Objective(s): To evaluate the level of Psychological Empowerment among Nurses as perceived by their Point of View, and identify the differences in nurses' Psychological Empowerment with regard to age, gender, graduation level, and years of work employment.
Methodology: A descriptive analytic design was conducted on nurses in Psycho-social health Units in Primary Health Care Centers in Kirkuk Governorate, to achieve the objectives of the study. A convenient (non-probability) sample of 84 nurses was selected. The data collected through self-report method for the period from 25th August to 10th October 2022. The questionnaire was adopted
... Show MoreThe main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreWhile providing important news information, News tickers ( also called sliders or crawlers ) have become one of the methods used daily by satellite channels, because it’s almost a continuous news coverage and as it seems, it has become today an addition to the news world. Hence, satellite channels need to look for a mechanism to build news tickers in order to develop them even though they are still today not recognisable and in need of being classified in a radio or television art, and that is not easy. This research sheds light on the construction of the slider of a news satellite channel, which is important according to our modest convictions, as it can be the beginning of a long scientific research in a new field of study. The probl
... Show More: تفرض مرحلة إعادة بناء الدولة أو مرحلة بناء الدولة حالتين متقاربتين، لكن تختلف تجربة كل منهما عن األخرى، ففي الحالة األولى نعني بها أن دولة ما متكاملة المقومات سواء القانونية أو السياسية أو االقتصادية، وتمتلك هذه الدولة الشرعية القانونية واالعتراف الدولي، لكن تتعرض هذه الدولة لألزمة سواء كانت ثورة أو انقالب أو احتالل، وإلى السقوط ونهاية نظامها السياسي القانوني ومن ثم إعادة بناء الدولة ومنظومتها السياسية..
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreLanguage Teaching & Leaning Problems at the Iraqi university level: Image & Reality