This research aims at identifying the communicative habits and content reflections on the communication process, especially the young audience which is one of the main group for whom the announcements are made. Because young people face life with passion and aspiration making them respond to each effect used by the media in the design of the advertising using all the effective techniques, attractive methods for young children like depending on drama, technical tricks, music and logos easily to be remembered and responded to the desires of the young in their entertainment. This research also aims at identifying the impact of the internet as a channel of commercial advertising on the purchasing behavior of young people at the universities and determine the importance of the internet advertisings' elements for them, as well as specifying the causes of their preference to some websites other than others The researcher uses a descriptive survey method by applying it on a simple random sample of students from the College of Media at the Universities of Baghdad. The researcher ends with several conclusions. One of its most important is that the Internet advertisings draws attention to the advertised product but not the required distinctive image. There are 15% of them do not support this, and 25% of respondents completely agree with the motivations of online advertisings towards the purchase. The others are fluctuating between supporters and opponents because these advertisings represent a new situation for the internet users and students of the universities. In addition, online advertisings help students of the universities to develop a criterion for evaluating the advertised products indirectly due to its newness. The research ends with some recommendations. One of the most important recommendations is to focus on taking into account the use of a beautiful melody commensurate with the nature of the product advertised and choose famous and beloved song when using a dance song style and the manufactures interested to announce must take into account the ease of use and download speed when they design webs. Also, webs' designs must fit the needs and tastes of the target audiences a constantly updated the site.
Morphological theories shape the leading platform to theoretically and practically consider the assets connected with the emergence of the city, and its growth and development over time. In this paper, five elements of the urban form are typified: structure/tissue, plot, building, block, and the street pattern will be addressed. Understanding the urban form at the different levels within its ingredients could lead to shape a base launch of how to consider the potentiality of the development and sustainability of a particular area.
This work examines the ability of a special type of smart antenna array known as Switched Active Switched Parasitic Antenna (SASPA) to produce a directive and electronically steerable radiation pattern. The SASPA array consists of antenna elements that are switchable between active and parasitic states by using P-Intrinsic-N (PIN) diodes. The active element is the element that is supplied by the radio frequency while short-circuiting the terminals of an element in the array results in a parasitic element. Due to the strong mutual coupling between the elements, a directional radiation pattern with high gain and a small beamwidth can be produced with only one active element operating at a time. By changing the parasitic state to the active
... Show More"In this article, "we introduce the concept of a WE-Prime submodule", as a stronger form of a weakly prime submodule". "And as a "generalization of WE-Prime submodule", we introduce the concept of WE-Semi-Prime submodule, which is also a stronger form of a weakly semi-prime submodule". "Various basic properties of these two concepts are discussed. Furthermore, the relationships between "WE-Prime submodules and weakly prime submodules" and studied". "On the other hand the relation between "WE-Prime submodules and WE-Semi-Prime submodules" are consider". "Also" the relation of "WE-Sime-Prime submodules and weakly semi-prime submodules" are explained. Behind that, some characterizations of these concepts are investigated".
... Show MoreBackground: Pregnancy is considered a major risk factor for development and progression of periodontal disease. There are hormonal changes in both estrogen and progesterone hormones in addition to bacterial effect and poor oral hygiene that will enhance development of periodontal disease in pregnant women. Materials and methods: Seventy subjects were enrolled in the study, the subjects with an age range (20-35) years old without any history of systemic disease. The subjects were divided into 20 non-pregnant women they represent the control group (G I), 30 pregnant women with gingivitis (GII) and 20 pregnant women with periodontitis (GIII).All periodontal parameters (plaque index, gingival index, bleeding on probing, probing pocket depth an
... Show MoreAbstract
The research aims to verify the dimensions of tax justice that exist in Iraq, and to determine their impact on tax compliance. Through a revised model of tax justice based on the literature of tax justice according to the classification of the studies of (Saad, 2009), (Wenzel, 2002), by using a questionnaire as an experimental measurement tool designed to be in line with perceptions of tax justice in Iraq. To define the dimensions of tax justice (the independent variable) with eight dimensions (Distributive justice, Exchange justice, Vertical justice, Horizontal justice, Retributive justice,
... Show MoreAnalyzing sentiment and emotions in Arabic texts on social networking sites has gained wide interest from researchers. It has been an active research topic in recent years due to its importance in analyzing reviewers' opinions. The Iraqi dialect is one of the Arabic dialects used in social networking sites, characterized by its complexity and, therefore, the difficulty of analyzing sentiment. This work presents a hybrid deep learning model consisting of a Convolution Neural Network (CNN) and the Gated Recurrent Units (GRU) to analyze sentiment and emotions in Iraqi texts. Three Iraqi datasets (Iraqi Arab Emotions Data Set (IAEDS), Annotated Corpus of Mesopotamian-Iraqi Dialect (ACMID), and Iraqi Arabic Dataset (IAD)) col
... Show MoreLet R be a commutative ring with unity and let M be a unitary R-module. In this paper we study fully semiprime submodules and fully semiprime modules, where a proper fully invariant R-submodule W of M is called fully semiprime in M if whenever XXïƒW for all fully invariant R-submodule X of M, implies XïƒW. M is called fully semiprime if (0) is a fully semiprime submodule of M. We give basic properties of these concepts. Also we study the relationships between fully semiprime submodules (modules) and other related submodules (modules) respectively.
This paper presents the design, construction and investigates an experimental study of a parabolic Trough Solar Collector (PTSC). It is constructed of multi – piece glass mirror to form the parabolic reflector (1.8 m ? 2.8 m) its form were checked with help of a laser and carbon steel rectangular as receiver. Sun tracker has been developed (using two – axis) to track solar PTSC according to the direction of beam propagation of solar radiation. Using synthetic oil as a heat transfer its capability to heat transfer and load high temperature (?400 oc). The storage tank is fabricated with stainless steel of size 50 L. The experimental tests have been carried out in Baghdad climatic conditions (33.3o N, 44.4o E) during selective days of the
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More