The study discusses the marketing profile of electoral candidates and politicians especially the image that takes root in the minds of voters has become more important than the ideologies in the technological era or their party affiliations and voters are no longer paying attention to the concepts of a liberal, conservative, right-wing or secular, etc. while their interests have increased towards candidates. The consultants and image experts are able to make a dramatic shift in their electoral roles. They, as specialists in the electoral arena, dominate the roles of political parties.
The importance of the study comes from the fact that the image exceeds its normal framework in our contemporary world to become political and cultural industry with its environment, tools and systematic action.
The study aims to find out the psychological, cultural and political values contained in the image that embodies political symbols. It covers the sides and relations of image’s strength and its political and social functions which now represent the candidates and citizens within the contemporary political marketing operations.
The study tends to use descriptive approach to review the prosperities of the political image and mechanisms of those in charge of image makers. It also includes analysis of the functional role of the image in the political marketing.
Certainly there is a negative impact on development due to corruption in its corruption forms It is administrative and financial as well as direct impact on all sectors Including the health sector, which has seen in Iraq a marked setback in performance and services , The research aims at the possibility of demonstrating the negative effects of financial and administrative corruption on health institutions and Inability to meet health needs The extent to which Regulatory institutions and institutions manage to reduce financial and administrative corruption and ways of dealing with it The phenomenon of financial and administrative corruption is the most serious phenomenon because of its impact on economic growth, which in turn impedes the
... Show MoreMultiple applications use offline handwritten signatures for human verification. This fact increases the need for building a computerized system for signature recognition and verification schemes to ensure the highest possible level of security from counterfeit signatures. This research is devoted to developing a system for offline signature verification based on a combination of local ridge features and other features obtained from applying two-level Haar wavelet transform. The proposed system involves many preprocessing steps that include a group of image processing techniques (including: many enhancement techniques, region of interest allocation, converting to a binary image, and Thinning). In feature extraction and
... Show MoreIn this work, we present the notion of a multiplier on AT-algebra and investigate several properties. Also, some theorems and examples are discussed. The notions of the kernel and the image of multipliers are defined. After that, some propositions related to isotone and regular multipliers are proved. Finally, the Left and the Right derivations of the multiplier are obtained
Abstract:
The great expansion of teaching skills requires finding ways and methods to help teachers acquire experiences of all kinds. The researcher found in the subject of the teaching skills for teachers in public and private schools a fertile field for conducting a study that enables the measurement of these skills. Thus, the study aims to identify the skills of teaching lessons for teachers, the difference in teaching lesson skills for teachers according to the years of service, the differences in teaching lesson skills for teachers according to the specialized teachers and non-specialized teachers, the differences in teaching lesson skills for teachers according to the public and private school. The
... Show MoreThe aim of this paper is to study the nonlinear delay second order eigenvalue problems which consists of delay ordinary differential equations, in fact one of the expansion methods that is called the least square method which will be developed to solve this kind of problems.
With the freedom offered by the Deep Web, people have the opportunity to express themselves freely and discretely, and sadly, this is one of the reasons why people carry out illicit activities there. In this work, a novel dataset for Dark Web active domains known as crawler-DB is presented. To build the crawler-DB, the Onion Routing Network (Tor) was sampled, and then a web crawler capable of crawling into links was built. The link addresses that are gathered by the crawler are then classified automatically into five classes. The algorithm built in this study demonstrated good performance as it achieved an accuracy of 85%. A popular text representation method was used with the proposed crawler-DB crossed by two different supervise
... Show Moreتكمن أهمية البحث من الاستفادة من تمرينات الخاصة بمساعدة استعمال أي جهاز تدريبي مثل استعمال جهاز (Vertimax) فإِنَّ هذهِ التدريبات تساعد في تطوير التحمل الخاص وفقًا لما يتطور من قدرات بدنية باستعمال هذا الجهاز، ومن هنا برزت مشكلة البحث انه من المهم للاعب ان يعمل على الروافع الجسم للحصول على اداء افضل في عملية الرمي والحصول على افضل انجاز لهذة الفعالية باستعمال جهاز تدريبي جديد حيث يسلط مقاومات متعددة في ان وا
... Show MoreThe Bangestan reservoir, which occurs in the Ahwaz oilfield, consists of the middle Cretaceous limestone Ilam and Sarvak Formations that were deposited in the Zagros Basin. The reservoir is divided into ten Zones (A to J) formed in the upper Albian-Santonian and contains considerable hydrocarbon accumulations. The limestones were deposited on an extensive shallow carbonate platform on a passive margin and are dominated by rudist biostrome and grainstone facies. Paleogeographical changes mean that identification of the facies is complex. Seismic stratigraphy and isotopic data are used to better understand the structural and geological setting and develop an understanding of the sedimentary environment. The results show that the rudist biostr
... Show MoreThe intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show More