The researcher has studied in his research (International Public Relations methods in building the state's image through Cyberspace)
, analytical study of the Facebook and twitter pages for British foreign office , the role was played by the International Public Relations in building the mental image of British , especially after the new media and internet have became influential role in political life . and became an important tools used by political institutions as ministries of foreign affairs in the twenty: one century .
The researcher identified the problem of this study with the following question:
(what is the role of the International Public Relations in building the mental image of state through Cyberspace)
To answer this question , the researcher identified a set of objectives at based on analytical study , the important British foreign office on social media for building the mental image of British.
The researcher used survey method as descriptive study was used the content analysis to collection of information.
Atherosclerosis is the most common causes of vascular diseases and it is associated with a restriction in the lumen of blood vessels. So; the study of blood flow in arteries is very important to understand the relation between hemodynamic characteristics of blood flow and the occurrence of atherosclerosis.
looking for the physical factors and correlations that explain the phenomena of existence the atherosclerosis disease in the proximal site of LAD artery in some people rather than others is achieved in this study by analysis data from coronary angiography as well as estimating the blood velocity from coronary angiography scans without having a required data on velocity by using some mathematical equations and physical laws. Fif
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreIn this research was the study of the educational values when Shafei, contained in hair Shafi'i, and that what the role of these values in the education of generations, and the possibility of their application in the educational curriculum. Find addressed Shafei life and his time. The values derived from his hair, as well as quoting from the Koran and influenced by it, which is evident in the hair, governance and eating Alomthal.okzlk Find the importance of this thought in modern education, so as to realism and ease of application. It is the search results, the Shafi'i put thought educationally integral based on the Koran rise to the level of theory. Find and conclusions: that education in its present situation
... Show MoreThis study aims to answer the following question: Is a student who attaches to the social group strongly affected by social interaction and social status? The population of the study included a group of medical students at the University of Al-Kufa. To collect the required data, a scale of Social Group Attachment consisting of (25) items was administered to a sample of (600) students, (257) male students, and (343) female students. The results revealed that students do not have a high level of attachment to the social group and they have a fear of that. There are no significant differences between the levels of attachment between males and females. There are no significant differences regarding colleges, the four academic levels, a
... Show MoreThis thesis aims to show the effects of the development of the traditional manual system of the tax accounting process to the electronic system by the activation of the tax identification numbers (TINs) mechanism. The impact of this development is facilitating the tax accounting process, tax fraudand thus increasing the tax outcome.To prove the research hypothesis, an electronic system was designed based on income tax report, estimation note of individuals, in additional to using Adobe Dreamweaver application to write PHP, HTML, Javascript, and CSS web languages to implement the proposed system. The research reached a set of conclusions, the most important of which is; not enough the communication methods between the Genera
... Show Moreتعد الدولة الموحدية من اغلب دول العالم الاسلامي تميزا من حيث المذهب والايدلوجيا والنظام السياسي
،يريغت وأ ةلكشم وأ ةثداح ةجيتن ،ةعمالجا وأ درفلا هذختي فقوم هرهوج في ماعلا يأرلا دعي ةيوبرت تماكارتو ،ةيرثك تانوكم لىع هسسأ في موقي وهف اذل ،ةشاعلما ةايلحا تاقايس في لصيح فيو ،عمتمج يلأ يعماتجلاا لعفلا ةيصوصخ تاقايس بسحب يرسي ايرطف نوكي ام اهنم ،ةيفاقثو يعولا ةلاح تيبثت ديرت تاهج نم ةلعتفمو ةعنطصم تايطعمب اهيريست وأ اهذحش متي ىرخأ نايحأ ليكشت ةيلمع تنترقا ذل ،ةثدالحا كلت مهف ةأطو ليلقت وأ يريغت وأ فرح وأ ي
... Show More