The study tries to answer several questions posed by the subject, one of the important: How the Internet promotes rumor? And what are the most Internet applications that promote rumor? And the practical ways to reduce these negative? Using the process of in vestige and reading theoretical heritage available in this field, and inferred the numbers and statistics marked the uses of the Internet and its applications over recent years, and the characteristics of each these tools in the field of collection, processing, and dissemination of information
This study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance
Research summary
Westernization is a term not familiar to our scholars at the beginning of the emergence of translation from Western literature, sciences and arts in its detailed form now.
Westernization was not an issue that those Greeks, Persians, Romans, Indians and others worked on translating those sciences and cultures. Rather, it was a process of transferring a new philosophy and logic that had not been previously seen by the Arabs, so they were affected by it in a strange way, to the point of fascination by some of them. For this reason, this research came to clarify these issues and address them within the scientific methodology.
Value Engineering is an analytical study on projects or services using a specific procedure and a multidisciplinary working group, works for the identification and classification of the project functions; either for a better perfuming of these functions or to lessen the total project cost or the two together. Value Engineering main aim is on finding innovative alternatives, without effecting the basic requirements of the project, its methodology based on the functional balancing between the three elements of production "performance, quality and cost". This methodology based on the "functional analysis", had shown high possibilities in solving any problem facing the production procedure , achieve better investment for available re
... Show MoreThis research deals with the study of the obstacles to peaceful coexistence in Iraq. Therefore, our hypothesis is that these obstacles are not attributed to one reason or to one source. Therefore, peaceful coexistence among the components of Iraqi society remains fragile and vulnerable to collapse and threat at any moment. This society, which is already in need of social relations, needs more than ever to coexist and consolidate it. Through the exercise of democracy in Iraq in a manner that guarantees rights and duties for all, to restore mutual trust between the components of this community in a way that feels they are citizens of the state.
The current research dealt with the development of sciences and arts over the course of human history, and the development of sciences with their natural and human trends are important areas in developing the knowledge and application base for industrial product design and design in its various fields. Bionic science is one of the sciences that works on applying biological methods and systems found in nature to study and design engineering systems and modern technology, and for industrial products to be highly efficient, durable and resistant to natural variables in daily life for use. The transfer of technology between life forms and industrial products is desirable because the processes of development at the level of science in general
... Show MoreAZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Different Arabic and Islamic societies are free of evil instincts. Therefore, certain provisions of legitimacy came to stress the importance of the intentions of sharia to achieve the interests of all people that involve several aspects, including the five fundamental things: religion, oneself, offspring, mind and money. Almighty Allah has specified certain punishments on those who violate these things by imposing punishments on the part of the criminal to preserve souls. He imposes the penalty of theft to preserve property, the Hadd punishment for adultery to preserve the symptoms, the punishment on the drunk to preserve the mind, and the Hadd punishment for the apostate to preserve the religion. By the adherence to these punishments li
... Show MoreThe research dealt with the design of the cost accounting system for the transport service and its Role in improving the efficiency of pricing decisions through the application of the cost system based on ABC activities. The main activities were defined and cost guides were to measure the cost of each service and to determine the cost of each service for the purpose of providing management with appropriate information and pricing decisions The problem of research in the lack of adoption by some public companies in the service sector on the cost accounting system to calculate the cost of service as well as the lack of identification of productive activities and service activities and therefore cannot make the appropriate decision t
... Show MoreThis study aims to conduct an exhaustive comparison between the performance of human translators and artificial intelligence-powered machine translation systems, specifically examining the top three systems: Spider-AI, Metacate, and DeepL. A variety of texts from distinct categories were evaluated to gain a profound understanding of the qualitative differences, as well as the strengths and weaknesses, between human and machine translations. The results demonstrated that human translation significantly outperforms machine translation, with larger gaps in literary texts and texts characterized by high linguistic complexity. However, the performance of machine translation systems, particularly DeepL, has improved and in some contexts
... Show More