Preferred Language
Articles
/
abaa-227
Demonstrators' slogans in Tahrir square (Analytical study of the communication message)
...Show More Authors

The research entitled "The Slogans of Demonstrators at Al-Tahreer Square – analytical study for communicative letters" studies the slogans of demonstrators as a communicative means having many signs reflecting the political, social, cultural relations exist in the minds of people. It is so easy to understand its meaning, examining its goals; and explaining their meanings. For these reasons, we have chosen such a topic. Since the means of communications transfer letters between a sender and receiver, the importance of this research is that it is a researchable trial to acknowledge the issues behind the demonstrators' slogans and the different styles have been chosen by them for a whole year; the different sides of the demonstration since it is a theoretical and scientific problem d and discussed. So, it is so important to focus on the content and issues of these slogans whether they are a signboard, shouting or songs. The research concludes that the demonstrators have used different methods to express their viewpoints; the slogans shows the huge variety in the media speech tools; the different cultural backgrounds of the demonstrators as well as their needs. Also, the slogans show the needs of people to live in a better economic and social life in Iraq.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of banking performance according to the CAMELS model An applied study of Al-Mansour Investment Bank for the period 2014-2018.
...Show More Authors

The banking sector has a significant impact on the economic growth of the country, and the importance of this sector must assess its financial performance from time to time, to measure the situation related to money for each bank and how to put the supervision of the efficiency of the full. The research aims at evaluating the financial performance according to the elements of the CAMELS model, which including capital adequacy, asset quality, management efficiency, profitability, liquidity, and market risk sensitivity. The research included the study of Al-Mansour Investment Bank during the period from 2014 to 2018. The base capital ratio was used to total assets to measure capital adequacy The proportion of investments to total a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Mar 20 2019
Journal Name
Journal Of The College Of Languages (jcl)
Culture and Western Hegemony: Postcolonial Theoretical Study
...Show More Authors

Postcolonial theory deals with the effects of colonization on the colonized societies and their cultures. It examines the complex relationship between the colonized and the colonizer, and it represents the textual reactions that deal directly with such an issue. It is also a literary critique to texts that carry racist or colonial implications. The emergence of postcolonial theory as an aspect of literary criticism represents a shift in the focus of studies regarding the relation between the western and non-western worlds.

In contemporary theoretical discourse, Edward Said has been among the more influential postcolonial critics to draw attention to the centrality of imperialism in Western culture. Said’s work has provided a th

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
مجلة كلية العلوم الاسلامية جامعة بغداد
Secret baptisms among Christian denominations, descriptive study
...Show More Authors

Christian rites and rituals to be performed, not abandon them, and they see it as a sacred duty in Christ's (as) followers, including: (secret baptisms among Christian denominations, descriptive study) baptisms in the Christian Mystery of God of the mysteries of the Church, every Christian must be baptized always resented It was alaimanh, the Guide mentioned in the Bible by Jesus to his disciples ((just go make disciples of all Nations and immersed them in the name of the father and of the son and of the Holy Spirit, teaching them to observe all that I advised you, and here I am with you all days to the end of the age))( And be baptized in the name of the father and the son and the Holy Spirit, and that's what makes this practice through th

... Show More
Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Al-academy
The technique of making Super - realism sculptures by Local alternative materials (Applied Study): إيهاب احمد عبد الرضا
...Show More Authors

This research is studying technique sculptures super - realism, search through, how the method of work, and the search for the materials used in their manufacture, and this is the first study in the field of art and the field of academic study in the country.Research consists of an introduction, And four sections, The introduction containing information on: research problem, Importance of research, Goals of the research, Limits of research, research approach, and research tools.The first section contains a technical study sculptures super -realism in contemporary sculpture, while the second section includes a search for alternative materials available in the local markets, for making sculptures super - realism, the third section dedicate

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 30 2021
Journal Name
Turkish Online Journal Of Qualitative Inquiry (tojqi)
A Pragmatic Study of the Student-Teacher Relationship in the Dangerous Minds
...Show More Authors

Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Cytological study in the Iraqi speeies of the genus Bromus L. Poaceae)
...Show More Authors

This paper is a part of a cytological studies of the genus Bromus L. in Iraq . Cl number for 103 specimens ropro^eming l^species determined . The course of meiosis including an analysis of chromosome configuradon for 27 collections belonging to 8 species were investigated . Meiosis was regular in most species . Tetraploid for B.scoparius L. (new cytotype ) and hexaploid ?'or " Kunth. were re^rted for the first time, cytological findings were supported the view of maintaining the closely related species B.danthoniae Trin. and B.lanceolatus Roth, as distinct species .

View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Thermodynamic and Kinetic Study of the Adsorption of Pb (II) from Aqueous Solution Using Bentonite and Activated Carbon
...Show More Authors

The adsorption of Pb(II) ions onto bentonite and activated carbon was investigated. The effects of pH, initial adsorbent dosage, contact time and temperature were studied in batch experiments. The maximum adsorption capacities for bentonite and activated carbon were 0.0364 and 0.015 mg/mg, respectively. Thermodynamic parameters such as Gibbs free energy change, Enthalpy change and Entropy change have been calculated. These thermodynamic parameters indicated that the adsorption process was thermodynamically spontaneous under natural conditions and the adsorption was endothermic in nature. Experimental data were also tested in terms of adsorption kinetics, the results showed that the adsorption processes followed well pseudo second- order

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Oct 30 2024
Journal Name
Internet Technology Letters
Using <scp>5G</scp> Standards for Smart Healthcare Applications and Designing an Artificial Intelligence‐Based Industry 4.0 Communication System
...Show More Authors
ABSTRACT<p>The introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing </p> ... Show More
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF