Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental image and its components; section two is about the concept of political parties, their elements, and classifications; section three discusses the title ‘the effectiveness of the function of public relations in the concept and aims of public parties. Chapter three is about a field study.
In this research note approximately prime submodules is defined as a new generalization of prime submodules of unitary modules over a commutative ring with identity. A proper submodule of an -module is called an approximaitly prime submodule of (for short app-prime submodule), if when ever , where , , implies that either or . So, an ideal of a ring is called app-prime ideal of if is an app-prime submodule of -module . Several basic properties, characterizations and examples of approximaitly prime submodules were given. Furthermore, the definition of approximaitly prime radical of submodules of modules were introduced, and some of it is properties were established.
يهدف البحث الحالي إلى اختبار العلاقة بين نوعية حياة العمل والإبداع التنظيمي في ديوان وزارة التخطيط ، ولبلوغ الهدف المذكور وبناء على معطيات البحث الاستطلاعي للباحث بني ألانموذج الفرضي للبحث الذي ضم المتغير المستقل والمعتمد، واعتماداً على حركية الأنموذج صيغت فرضيتان، ولاختبار صحة الفرضيات وجمع المعلومات من عينة البحث البالغة (100) مدير يمثلون مرك
... Show MoreIn the process of translating Qur’anic texts, there is an urgent need for interpretations of the Qur’anic text due to the presence of many incomprehensible Qur’anic verses or words because of our distance from the standard Arabic, language in which the Holy Qur’an was revealed, and the introduction of the foreign words into our language, in addition to the fact that many Qur’anic words are no longer used. All this prompted the need for the interpretation of the Qur'anic text, Therefore, it is necessary for the translator to resort to the books of interpretation if he intends to translate the Qur’an
This research deals with the rhetoric purposes of the passive voice in the holy Quran. First, we put an introductory to the concept of the Quran language and its difference of the spoken Arabic language during the revelation period. Besides; we gave a brief about the structure passive voice form of Arabic language. Second, we explained the purposes of passive voice used in the holly Quran with sufficient examples, commentaries and clarifications about all the cases. Rhetoric purposes that we deals with are: concision, emphasize an idea, avoid using the subject because it is known and clear for all or because it is really unknown, etc. This part has contained the most important purposes for the use of passive voice in holy Quran. At the end
... Show MorePalm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show Moreعملية تغيير حجم الصورة في مجال معالجة الصور باستخدام التحويلات الهندسية بدون تغيير دقة الصورة تعرف ب image scaling او image resizing. عملية تغيير حجم الصورة لها تطبيقات واسعة في مجال الحاسوب والهاتف النقال والاجهزة الالكترونية الاخرى. يقترح هذا البحث طريقة لتغيير حجم الصورة باستخدام المعادلات الخاصة بمنحني Bezier وكيفية الحصول على افضل نتائج. تم استخدام Bezier curve في اعمال سابقة في مجالات مختلفة ولكن في هذا البحث تم استخد
... Show MoreThere is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show Moreالملخص: لتحقيق أهداف البحث قامت الباحثة اعداد مقياس التلكؤ الاكاديمي اعتمادا على نظرية (باندورا) وتكون المقياس بصورته النهائية من (21) فقرة ، وطبق المقياس على عينة البحث البالغة (100) طالب وطالبة تم اختيارهم بالطريقة العشوائية البسيطة من مجتمع البحث ،وبعد جمع البيانات تم معالجتها باستعمال الوسائل الإحصائية المناسبة، توصل البحث الى النتائج الأتية : الى ان الطلبة ليس لديهم تلكؤ اكاديمي و اعلى من المتوسط، لا توج
... Show More