The educational function of television is one of the basic functions in light of the technical development that included the specialized satellite channels in all its fields, including the educational field, as its role became parallel to the role of educational institutions. These studies are among the descriptive studies in terms of the type of study methodology that describes the phenomenon, interprets its and extract the results and relationships between the variables. The study sample was multistage (random and intentional) included the students of the sixth academic and literary preparatory stage in the city of Baghdad.
The study problem was summarized by the following main question:
( What are the motives for the exposure of the students of Baghdad to the Iraqi educational channels ? What is the extent of the gratifications that have been achieved as a result of this exposure?).
Leading to the secondary questions that branched from it, the most important of which are:
- What are the habits and patterns of students' follow-up and educational programs in the Iraqi educational satellite channel?
- What are the motives for students' exposure to educational lessons in the Iraqi educational satellite channel?
- The study reached several results that can be summarized as follows:
- The high degree of exposure of the student population to the Iraqi educational satellite programs, especially for the students of the completed classes, thus achieving the result of the assumption (that the audience of the recipients is an active audience and its use of the media is a deliberate use to achieve a certain benefit).
- The results showed that the program plans included the preparation and broadcast of enrichment programs to address various issues and activities of interest to the student group, such as a targeted audience from the satellite channel?
The results indicated the high level of utilitarian motivations at the level of ritual motives of the study sample while they were following the educational channels of Iraq, including the adoption of the interesting method of providing educational lessons, as the extent of follow-up increased exponentially with a high degree of benefit from the contents of these programs.
This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show MoreIn the present study, the properties of the light elements, namely, H, He, Li, and Be, have been reviewed. Specifically, the nuclear decay of these nuclei has been reviewed. The mystery of the nuclear decay and potential is behind this work. The role of neutron has been investigated. The N/Z ratio has also been investigated in the study to relate the nuclear decay with the ratio. A new formula for nuclear potential has been suggested in the present study. This formula can describe the binding energy potential and the decayed particle energy depending on the N/Z ratio.
A joke is something that is said, written, or done to cause amusement or laughter. It could be a short piece or a long narrative joke, but either way it ends in a punchline, where the joke contains a second conflicting meaning. Sometimes when we read a joke, we understand it directly and fully, but this is not always the case. When a writer writes a joke, he intends to manipulate the reader in a way that the reader doesn’t get the joke at once. He does that by using pun on words or any other word play. We, as listeners to the joke, try to get the message depending mostly on the tone of the voice, in addition to other factors concerning vocabulary and grammar. But as readers of the joke, we need more other factors in order to get
... Show MoreFinancial Reporting Quality (FRQ) is one of the important topics in the financial management, it has the impact on the users decisions, it also effect on many other variables i.e dividend, therefore. This paper aims to provide a diameter of Financial Reporting Quality (FRQ) level for the companies listed on the Iraqi Stock Exchange. It also tries to show the FRQ effects on the dividend policy. The study sample was 13 listed companies in the Iraqi Stock Exchange for the period from 2007 to 2011. Kothari et al. 2005 model has been used to measure the FRQ, on the other hand the common stock share of the dividend was used to measure the dividend.
Many conclusions have been driven by the research
... Show MoreThis research aims to present a proposed model for disclosure and documentation when performing the audit according to the joint audit method by using the questions and principles of the collective intelligence system, which leads to improving and enhancing the efficiency of the joint audit, and thus enhancing the confidence of the parties concerned in the outputs of the audit process. As the research problem can be formulated through the following question: “Does the proposed model for disclosure of the role of the collective intelligence system contribute to improving joint auditing?”
The proposed model is designed for the disclosure of joint auditing and the role
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More
The reliability of the stress-strength model attracted many statisticians for several years owing to its applicability in different and diverse parts such as engineering, quality control, and economics. In this paper, the system reliability estimation in the stress-strength model containing Kth parallel components will be offered by four types of shrinkage methods: constant Shrinkage Estimation Method, Shrinkage Function Estimator, Modified Thompson Type Shrinkage Estimator, Squared Shrinkage Estimator. The Monte Carlo simulation study is compared among proposed estimators using the mean squared error. The result analyses of the shrinkage estimation methods showed that the shrinkage functions estimator was the best since
... Show MoreThe introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show More