Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental image and its components; section two is about the concept of political parties, their elements, and classifications; section three discusses the title ‘the effectiveness of the function of public relations in the concept and aims of public parties. Chapter three is about a field study.
The goal of current research is to identify the difficulties in the application of modern physics in the middle schools of the province of Baghdad schools from the perspective of teachers of physics trends, sample search of (127) teachers, Karkh Third Directorate, and use Researcher questionnaire data collection tool after applying it to teachers who have experience (5) years and more after confirmation of the validity and reliability of the scale (the tool) researcher has used the averages for the purpose of interpreting the results. the results showed that the difficulties have been in the order following: (difficulties related educational environment of modern trends of teaching, curriculum-related dif
... Show MoreThe research aims to identify the social control among kindergarten department students. In order to achieve the objective of the research, a sample of (400) female students: (200) from Baghdad University / Faculty of Education for women and (200) from Mustansiriyha University / Faculty of Basic Education were chosen randomly.
The researchers designed a tool to measure the social control of the study sample. It was exposed to group of specialists in the educational and psychological sciences, measurement and evaluation. In addition to specialists in kindergartens. Two indicators of validity were used. The Alpha-Cronbach method, Pearson correlation coefficient, and independent samples t-test were used to analyze the c
... Show More
The increase in military spending has become a feature of the times for many countries, including China. They have sought to increase their defence spending, not with the aim of domination and possession, but rather to protect their economic interests and to secure their foreign trade. The research aims to identify the impact of military spending by studying the nature of defence spending and its role in providing security. And stability and facilitating foreign investment in it, as well as storming the military industry, securing some humanitarian supplies, and participating in a variety of public works that can be used in the civil and military fields, and the aim of the research is to id
... Show MoreLeishmaniasis is a group of parasitic diseases caused by Leishmania spp., an endemic infectious agent in developing countries, including Iraq. Diagnosis of cutaneous lesion by stained smears, serology or histopathology are inaccurate and unable to detect the species of Leishmania. Here, two molecular typing methods were examined to identify the promastigotes of suspected cutaneous leishmaniasis samples, on a species level. The first was species-specific B6-PCR and the second was ITS1-PCR followed by restriction fragment length polymorphism (RFLP) using restriction enzyme HaeIII. DNA was extracted from in vitro promastigote culture followed by amplification of kDNA by B6 or amplification and digestion of LITSR/L
... Show MoreThe researcher attempts to examine Barman model in acquiring the historical concepts among fourth-grade students at literary classrooms. To this end, the researcher held the null hypothesis, there is no significant difference between the experimental groups who was taught based on Barman model and the control group that taught based on the traditional method in acquiring the historical concepts on the post-test. To testify the effectiveness of Barman model, the researcher administered a questionnaire included (60) items on bunch of female-students who were selected from al-khamaeal preparatory school in al-hurriyah district in Baghdad. The author utilized different statistical tools to analyze the collected data. &
... Show MoreThis paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show MoreFormed leadership skills and organizational trust Based on intellectual that underpinned the current research, as represented leadership skills variable interpretative represented in organizational trust-response variable.
The research aims to test the relationship and the impact of leadership skills dimensions in organizational trust dimensions for the purpose of achieving its objectives were formulated hypotheses main relate to test the effect and the relationship between the variables of research for the purpose of testing those hypotheses applied research on a sample of heads of departments and officials of the people at the center of the Ministry of Higher Education and Scientific Research, where th
... Show MoreAbstract [email protected] Background: Acute Traumatic Stress Disorder (ATSD) might be complicated by Post Traumatic Stress Disorder (PTSD). Psychological First Aid (PFA) said to be helpful to reduce the possibility of reduction of ASD and PTSD symptoms. PFA is simple procedure to deliver help & support to victims, may be by some one close to him, quietly and professionally. Iraq has and is still experiencing, continuous traumatic stresses. ATSD is especially seen in war such as during the Gulf War, Embargo and nowadays under the current American occupation. With the extreme shortage of recourses and the given late priority to psychological problems and intervention have disastrous consequences on the psycho-social wellbeing of peop
... Show More
This research addresses: Sharh Usul Al-Bazdawi "Explanation of the Fundamentals for Al-Bazdawi", by studying and investigating, from the beginning of prohibition chapter to its end. The researcher conducted a study about this book stating its significance and introducing the compiler and the commentator. The researcher as well mentioned that the prohibition has a special formula and requires repetition, and he went on explaining that prohibition according to Hanafis does not require absolute corruption of the prohibited matter unless based on an evidence, and that what is condemned as wrong act for itself is considered void and what is condemned as wrong act for external reasons is considered corrupt accor
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More