Preferred Language
Articles
/
abaa-445
Media and democracy between propaganda and incitement
...Show More Authors

First: The entrance to media and democracy
The growth of the media and the development of its technologies are linked to the development of the democratic system and its political and mass institutions. In many cases, the technologies concerned were able to open the closed doors to the spread of democracy and broaden the base of its applications. As Dupre points out, “audio-visual has opened the image and sound after printing has opened the natural language” (1) to democratization. The generalization of the book, due to the development of printing, led to the transcendence of the Church's dominance in Europe, and the direct broadcasting and transmission of information enabled the media to transcend the domination of factional systems. On top of that and that, the development of media technologies has opened the coffers of human and social memory for the purpose of possessing knowledge, and how to translate it into a continuous daily action. It allowed us to see the shape of the earth, see the weather conditions and economic movement, see the political decision directly, and get to know better the data of the scientific and technical achievement (2).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Physics: Conference Series
Approximately Regular Rings and Approximately Regular Modules
...Show More Authors

Abstract In this work we introduce the concept of approximately regular ring as generalizations of regular ring, and the sense of a Z- approximately regular module as generalizations of Z- regular module. We give many result about this concept.

Scopus Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of Iraqi Virtual Library
...Show More Authors

      In developing countries, individual students and researchers are not able to afford the high price of the subscription to the international publishers, like JSTOR, ELSEVIER,…; therefore the governments and/or universities of those countries aim to purchase one global subscription to the international publishers to provide their educational resources at a cheaper price, or even freely, to all students and researchers of those institutions. For realizing this concept, we must build a system that sits between the publishers and the users (students or researchers) and act as a gatekeeper and a director of information: this system must register its users and must have an adequate security to e

... Show More
View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Paths and Cycles in Alpha Topological Spaces
...Show More Authors
Abstract<p>This paper presents the concepts of prepaths, paths, and cycles in α-topological spaces and studies them in orderable spaces. Also, many relationships are proved with their equivalences using some properties in topological spaces like compactness and locally connectedness.</p>
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Tolerance and its impact on building society
...Show More Authors

Tolerance and its impact on building society

View Publication Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Internet Addiction: Healthy, Psychological, and Social Implications
...Show More Authors

The aim of the current research is to explore the health, psychological, and social implications of Internet addiction. Internet addiction is a new type of addiction, which negatively affects an individual’s life and creates social problems, psychological and nervous disorders. The research is divided into three sections: The first section is devoted to the definition of the research and includes the research problem, its importance in addition to the objectives, and the search terms were defined in it. The second section included the concept of addiction on the Internet and the causes, symptoms of addiction, forms, and previous studies were reviewed. As for the third topic, it deals with the theories explaining Internet addiction and

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of The College Of Languages (jcl)
Pain and pleasure in Ibn – Zaidoon poetry
...Show More Authors
Pain and pleasure is when a human being feels pain because one of his sensesُ organs has extremely stressed itself. Where as pleasure is when someone indulges himself as much as he could and get away from anything that causes pain to himself and hurts it. The beauty of the poetic text appears when two contradictions occur together in the same poetic line, just like when two contradictions live together in life; they live and struggle in one poem. Contradictory duet is not something new poetry was based on this duet since it was found until this day. It forms the essential source from which meanings come, and the guide lines that drawn by the personal experience of the poet are formed from it.I preferred to study the duet of Ibn- Zaido
... Show More
View Publication Preview PDF
Publication Date
Tue Apr 18 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Glomerulogenesis and Histomorphometeric in Mus musculus Embryo
...Show More Authors

In mammals, the kidneys originate in an embryo from the mesoderm through three excretory organs, namely: Pronephros, Mesonephros, and Metanephros. After the formation of Metanephros is completed, the kidneys begin to form nephrogenesis through mesenchymal cells located at the tip of the ureteric bud, that contribute in the formation of glomerulus and Renal tubules. The stages of glomerulus formation in the embryo of albino mice at the age of 14 to 19 days of gestation were studied. It was obtained after the sacrifice of the expectant mother and the kidneys were excised from the embryos and fixed using Aqueous Bouin's solution, Microscopic slices with a thick

... Show More
View Publication
Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
Helicobacter Pylori Seropositivity and Acute Myocardial Infarction
...Show More Authors

Background: Acute myocardial infarction
(AMI) is one of the most common diagnoses
in hospitalized patients. The stimulus that
initiates the acute inflammatory process in AMI
has not been identified. Conventional risk
factors account only for approximately half of
the patients with clinically apparent
atherosclerosis which can leads to AMI.
Recently a potential link between infectious
agents and atherosclerosis has been suggested
Objective: To find a possible association
between Helicobacter pylori (H. Pylori)
infection and AMI.
Method: We studied the prevalence of antiH. pylori antibodies in 94 patients who were
admitted with the diagnosis of AMI and a
similar number of healthy individuals w

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
J-Prime submodules and some related concepts
...Show More Authors

Suppose R has been an identity-preserving commutative ring, and suppose V has been a legitimate submodule of R-module W. A submodule V has been J-Prime Occasionally as well as occasionally based on what’s needed, it has been acceptable: x ∈ V + J(W) according to some of that r ∈ R, x ∈ W and J(W) an interpretation of the Jacobson radical of W, which x ∈ V or r ∈ [V: W] = {s ∈ R; sW ⊆ V}. To that end, we investigate the notion of J-Prime submodules and characterize some of the attributes of has been classification of submodules.

Scopus (1)
Scopus Clarivate Crossref