Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental image and its components; section two is about the concept of political parties, their elements, and classifications; section three discusses the title ‘the effectiveness of the function of public relations in the concept and aims of public parties. Chapter three is about a field study.
Filled the place thought philosophers and ancient is the identity that you know The value of belonging to a World Geography existential - the spiritual , and Which is characterized by the structure humanity from one another and the Rest of the organisms they interact with him alone by environmental Conditions - surrounding has to achieve time through continuous movement Localized or comprehensive . The place is exemplified by making special Natural Great Creator, I believe making structure humanity combined - Individual interactive because of its influential role in all daily consumer Productions and creative arts, specifically drama's TV , because the place in Aesthetic discourse - TV drama directly affect the creating and building the
... Show MoreThe research aims to identify the social control among kindergarten department students. In order to achieve the objective of the research, a sample of (400) female students: (200) from Baghdad University / Faculty of Education for women and (200) from Mustansiriyha University / Faculty of Basic Education were chosen randomly.
The researchers designed a tool to measure the social control of the study sample. It was exposed to group of specialists in the educational and psychological sciences, measurement and evaluation. In addition to specialists in kindergartens. Two indicators of validity were used. The Alpha-Cronbach method, Pearson correlation coefficient, and independent samples t-test were used to analyze the c
... Show MoreThe purpose of the theme of redesign of jobs one of the topics the task that offers the possibility for individuals to perform several tasks in the organization of health at the same time gain experience and diverse skills and achieve compatibility between the requirements of the most appropriate function and organization of the hand ,hence, the idea of studying the redesign of jobs of the division of blood transfusion services in the department of health Baghdad Rusafa to change the conventional methods used in the performance of functions ,which are no longer able to meet the needs of patients where blood transfusion is a key ingredient in health care and equal access to safe blood is needed
... Show MoreResults: The results summarized two goals, the first goal stipulates (to identify the degree of cyberbullying among academically outstanding students in the middle school stage). To achieve this goal, the researchers applied the research tool (electronic bullying scale) and then extracted the arithmetic mean for the sample of the current research, which amounted to (6.28) with a standard deviation of (4.03). Then the researchers applied the t-test for one sample to identify the significance of the differences between the means. The arithmetic mean for the sample and the hypothetical (theoretical) mean, which amounted to (11.5) degrees, and after applying the T-test for one sample, it was found that the calculated T-value, which amounted to
... Show MoreDue to the importance of the extraction process in many engineering and medical industries, in addition to great interest in medicinal plants, in this research, microwave-assisted extraction has been applied to extract some active compounds from Rosmarinus officinalis leaves. The optimal extraction conditions were then determined by calculating the ratio and extraction efficiency. The process has also been described through kinetic study by applying five kinetic models, the Hyperbolic diffusion model, Power low model, the First order reaction model, Elovich's model, and Fick's second law diffusion model and determining their compatibility with the studies operation, and determining the kinetic constants for each model. The result
... Show MoreThis experimental study focuses on scouring in box culvert inlets under steady-state conditions and at different percentages of blockage ranging from 0% to 65%, and also looks at the hydraulics of water in the culvert. The investigation shows that the blockage of the culverts has influenced the scouring pattern at the blocked culverts' entrances. Ten experiments were carried out at the laboratory to see how blockage impacts the scouring pattern upstream of a box culvert during steady flow. Both partially blocked and unblocked cases were implemented in this study. The experimental tests were done until the equilibrium scour occurred, which took about 3.5 hours of water flow to reach equilibrium conditions. The results r
... Show MoreOptimizing the Access Point (AP) deployment has a great role in wireless applications due to the need for providing an efficient communication with low deployment costs. Quality of Service (QoS), is a major significant parameter and objective to be considered along with AP placement as well the overall deployment cost. This study proposes and investigates a multi-level optimization algorithm called Wireless Optimization Algorithm for Indoor Placement (WOAIP) based on Binary Particle Swarm Optimization (BPSO). WOAIP aims to obtain the optimum AP multi-floor placement with effective coverage that makes it more capable of supporting QoS and cost-effectiveness. Five pairs (coverage, AP deployment) of weights, signal thresholds and received s
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
A Multiple System Biometric System Based on ECG Data
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.