This research is aimed at identifying the communicative habits and the impact of the content on the communicative process, especially the youth audience, which is one of the most important categories to which the advertisement is directed, as young people face life with passion and aspiration that make then responsive to all the influences used by the media in designing advertisements which use all the techniques and methocls to attract young people, such as relying on drama , artistic tricks, musical phrases and advertising slogans that respond to the desire of young people in entertainment.
The research aims to identify the reflection of television advertising and its impact on the development of the cognitive abilities of university youth as well as identify the most prominent effects that have been reflected on them. The researcher used the descriptive method, which allows him to survey the performance of the communicative medium and the communication message together in accordance with the research requirements. The research uses the questionnaire as a field to explore their views on the subject of university youth exposure to television advertising and its reflection on the development of their cognitive abilities.
The research has reached many conclusions, the most important of which is that television advertising has a positive impact on university youth in developing their cognitive abilities and a great role in teaching students how to convince and attract others, and the nature of television advertising requires a high mental level of thinking, understanding and enhancing information among students
Background: Helicobacters are motile curved, oxidase and catalase positive,
gram negative rods similar in morphology to vibrios. The cells have polar flagella
and are often attached at their ends given pairs "S" shapes or seagull
appearance.
Object i ves: The present study was undertaken to estimate the serodiffusion of
H. pylori and hepatitis A virus (HAV) in 300 patients attending two centers in
Baghdad.
Metthods:: HAV was determined by the detection of HAV-IgM in the serum samples. Detection of H. pylori was by ELISA and endoscopic examination.
Resul t s: The serodiffusion of H. pylori was 40% (n=120). Out of the 120
patients infected with H. pylori, 50(41 .6%) patients were diagnosed clinically to
have g
Keys to four genera and twelve species of the subfamily Phlaeothripinae (Phlaeothripidae) were constructed, these are: Haplothrips; Karnyothrips; Phlaeothrips; and Dolicholepta ,and the species are: Haplothrips cerealis Priesner; Haplothrips tritici kurdjumov, Haplothrips hukkineni Priesner; Haplothrips subtilissimus (Haliday) ؛ Haplothrips reuteri Karny; Haplothrips jasonis Priesner; Haplothrips sallloumensis Priesner ; Haplothrips pharao Priesner ; Phlaeothrips sycomri Priesner ; Karnyothrips flavipus (Jones); Karnyothrips melaleucus (Bagnall) ; Dolicholepta micrurus (Bagnall). These were collected from Baghdad
... Show MoreThe research has designed for studying the relationship between manufacturing strategy and its flexibility under the flexible manufacturing system with their reflection on the competitive environmental performance of the firm. To interpret and tackle the problem, a hypothesis has formulated stating that “ the competitive performance of a firm is interpreted by the manufacturing strategy and flexibility which are derived from the firm and its business strategies under the flexible manufacturing system”. Related literatures with their theoretical dissertations, which enhanced the thoughtful content, have analyzed. An illustrative case study on the flexible manufacturing system at Toyota Motors Corporation working at the g
... Show MoreThe presented work shows a preliminary analytic method for estimation of load and pressure distributions on low speed wings with flow separation and wake rollup phenomena’s. A higher order vortex panel method is coupled with the numerical lifting line theory by means of iterative procedure including models of separation and wake rollup. The computer programs are written in FORTRAN which are stable and efficient.
The capability of the present method is investigated through a number of test cases with different types of wing sections (NACA 0012 and GA(W)-1) for different aspect ratios and angles of attack, the results include the lift and drag curves, lift and pressure distributions along the wing s
... Show Moreالحمد الله أولا واخرا وبعد .. إن الواقع الذي عايشه الناس في ظل دولة المسلمين منذ إقامة دولة الإسلام بعد بعثة الرسول الكريم (صلى الله عليه وسلم ) في المدينة ولأكثر من أربعة عشر قرنا نرى إنه عاش في كنف هذه الدولة الكبيرة من بلاد الصين شرقا وإلى وسط أوربا وجنوب فرنسا غربا العشرات من الملل و الأديان والأجناس وممن لا يدينون بالإسلام وهم كما تحفظ لهم دولة الإسلام منهم وعيشهم الرغيد فهم يمارسون شعائرهم وطقوسهم الديني
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThis study was conducted for evaluating the cytotoxic effect of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli on the proliferation of primary cancer cell cultures, obtained from tumor samples that were collected from (13) cancer patients and as follows: (five colon cancer patients, two bladder cancer patients, two breast cancer patients, two stomach cancer patients and two lung cancer patients), and on normal cell line (rat embryonic fibroblast / REF) (in vitro) with the use of different concentrations starting from (1) mg/ml and ending with (0.0002) mg/ml by making two fold serial dilutions by using the 96- well microtiter plate, and in comparison with negative (PBS) and positive (MMC, at concentration
... Show More