Preferred Language
Articles
/
abaa-163
Trends of University Professors towards the Role of Social Networking Websites in Shaping Public Opinion about the Security Crises
...Show More Authors

Social networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the questionnaire form to identify the Iraqi academic elite's attitudes towards the role of social network sites in the formation of electronic public opinion towards security crises that Iraqi society has witnessed. By distributing the questionnaire to 112 of academic lecturer of various specializations and scientific titles, the researcher has come up with a number of results:
1-lecturers at Iraqi universities use Facebook in a percentage of 92%
2-Most of the Iraqi academic elite user social networking sites for three hours every day
3-The statement “expressing public opinion towards various security events and crises” has taken the first place in a percentage of 90% ranking as the most important communicative advantages achieved when using the social networking sites.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تقييم الأداء المالي لشركات التأمين باستعمال النسب المالية: دراسة حالة في الشركة الجزائرية للتأمين
...Show More Authors

Les sociétés d’assurances sont considérées parmi les importantes entreprises financières non bancaires.

      Pour que ces sociétés assurent sa continuité d’existence, il faut qu’elles veillent au rendement financier qui représente ses différentes actions durant une période déterminée, en effectuant une évaluation permanente en utilisant de différentes méthodes parmi lesquelles l’analyse financière avec ses aspects divers.

         L’objectif de cette étude est d’évaluer le rendement financier des sociétés d’assurances et où projette l’étude sur la société Algérienne d’assurance durant la période 07- 09.

View Publication Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
قياس وتحليل تفاعل عمل المضاعف والمعجل في الاقتصاد العراقي باستخدام نموذج المستخدم – المنتج الديناميكي
...Show More Authors

The individual average income is considered one of the most used criteria for the distinguishing between the developed and the developing countries, for this reason the efforts of economic development has been construed on increasing the average national income, the investment expenditures is considered one of the basic foundations for economic development operation which lead to the expanding the prodection power of the economy, and increasing the level of national income in an averages greaten than the primary expenditures due to the work and interaction between the multiplier and the accelerator. But the ability of the economic sectors in the generation of national income as a result of the primary expenditures is different fr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 13 2018
Journal Name
Arab Science Heritage Journal
الطعام الطعام وآدابه في كتاب بهجة المجالس للامام ابن عبدالبر القرطبي (ت463) (دراسة اجتماعية )
...Show More Authors

That God Almighty coast with good things to eat and permitted smug, which did not like Muharram, and the Almighty said: Eat well and do good.

 The Prophet peace be upon him if making him some of his friends food and preen it on as it was their situation at the time and then called him an answer to that, and most people prefer to eat and drink on the other other sanctuary Kalmbus and the audio and others

View Publication Preview PDF
Publication Date
Mon Oct 22 2018
Journal Name
Arab Science Heritage Journal
اخبار أخبار الزمان في تاريخ بني العباس للخزرجي (ت812هـ) دراسة وتحقيق العصر العباسي الأول
...Show More Authors

تحيا الأمم بتراثها فهو الأساس الذي تنطلق منهُ، وما من أمة إلاّ ولها تراث، وهو سر حياتها وديمومتها ، فالأمة العربية الأسلامية لها تراث تليد التي تشرفت بحمل أقدس رسالة سماوية وأكملها لأمم الأرض، فكانت نبراساً أهتدت به البشرية حتى انتشلتها من واقعها المريض إلى أرغد عيش وأقوم خلق وأنبل نفس .

View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
حوليات أداب عين شمس
المنظور الزمني وعلاقته بجودة الحياة الاكاديمية لدى طلبة جامعة بغداد
...Show More Authors

Abstract The aim of the current research is to identify the time perspective and the quality of academic life of Baghdad University students. The research also aims to identify the relationship between the time perspective and the academic quality of Baghdad University students and the extent to which the time perspective dimension of academic quality contributes to the identification of the difference between the time perspectives in terms of gender. Finally, the research aims to identify if there is a significant difference in the quality of academic life between males and females. The scales were applied to a number of (434) university male and female student. A one-sample t-test, a two-sample t-test, the analysis of the variation, the P

... Show More
View Publication
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref