Preferred Language
Articles
/
abaa-749
MOTIVES FOR STUDENTS TO BE EXPOSED TO EDUCATIONAL PROGRAMS ON TV CHANNELS (Iraqi educational channels as a model)
...Show More Authors

The educational function of television is one of the basic functions in light of the technical development that included the specialized satellite channels in all its fields, including the educational field, as its role became parallel to the role of educational institutions. These studies are among the descriptive studies in terms of the type of study methodology that describes the phenomenon, interprets its and extract the results and relationships between the variables. The study sample was multistage (random and intentional) included the students of the sixth academic and literary preparatory stage in the city of Baghdad.
The study problem was summarized by the following main question:
( What are the motives for the exposure of the students of Baghdad to the Iraqi educational channels ? What is the extent of the gratifications that have been achieved as a result of this exposure?).
Leading to the secondary questions that branched from it, the most important of which are:
- What are the habits and patterns of students' follow-up and educational programs in the Iraqi educational satellite channel?
- What are the motives for students' exposure to educational lessons in the Iraqi educational satellite channel?
- The study reached several results that can be summarized as follows:
- The high degree of exposure of the student population to the Iraqi educational satellite programs, especially for the students of the completed classes, thus achieving the result of the assumption (that the audience of the recipients is an active audience and its use of the media is a deliberate use to achieve a certain benefit).
- The results showed that the program plans included the preparation and broadcast of enrichment programs to address various issues and activities of interest to the student group, such as a targeted audience from the satellite channel?
The results indicated the high level of utilitarian motivations at the level of ritual motives of the study sample while they were following the educational channels of Iraq, including the adoption of the interesting method of providing educational lessons, as the extent of follow-up increased exponentially with a high degree of benefit from the contents of these programs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
A Proposed Artificial Intelligence Algorithm for Assessing of Risk Priority for Medical Equipment in Iraqi Hospital
...Show More Authors

This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analytical Study of Some Lightest Nuclei H, He, Li and Be
...Show More Authors

     In the present study, the properties of the light elements, namely, H, He, Li, and Be, have been reviewed. Specifically, the nuclear decay of these nuclei has been reviewed. The mystery of the nuclear decay and potential is behind this work. The role of neutron has been investigated. The N/Z ratio has also been investigated in the study to relate the nuclear decay with the ratio. A new formula for nuclear potential has been suggested in the present study. This formula can describe the binding energy potential and the decayed particle energy depending on the N/Z ratio.

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Nasaq Journal
How Using Punctuation Dominates the Way Written Jokes Can Be Comprehended
...Show More Authors

A joke is something that is said, written, or done to cause amusement or laughter. It could be a short piece or a long narrative joke, but either way it ends in a punchline, where the joke contains a second conflicting meaning. Sometimes when we read a joke, we understand it directly and fully, but this is not always the case. When a writer writes a joke, he intends to manipulate the reader in a way that the reader doesn’t get the joke at once. He does that by using pun on words or any other word play. We, as listeners to the joke, try to get the message depending mostly on the tone of the voice, in addition to other factors concerning vocabulary and grammar. But as readers of the joke, we need more other factors in order to get

... Show More
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The effect of financial reporting quality on the dividend policies of companies listed in the Iraqi Stock Exchange
...Show More Authors

Financial Reporting Quality (FRQ) is one of the important topics in the financial management, it has the impact on the users decisions, it also effect on many other variables i.e dividend, therefore. This paper aims to provide a diameter of Financial Reporting Quality (FRQ) level for the companies listed on the Iraqi Stock Exchange. It also tries to show the FRQ effects on the dividend policy. The study sample was 13 listed companies in the Iraqi Stock Exchange for the period from 2007 to 2011. Kothari et al. 2005 model has been used to measure the FRQ, on the other hand the common stock share of the dividend was used to measure the dividend.

   Many conclusions have been driven by the research

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Opcion, Año
The effect of the -Zahorik- model on acquiring grammatical concepts among students of the College of Administration and Economics/University of Baghdad
...Show More Authors

Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A proposed model for disclosing the role of the collective intelligence system in improving joint auditing
...Show More Authors

This research aims to present a proposed model for disclosure and documentation when performing the audit according to the joint audit method by using the questions and principles of the collective intelligence system, which leads to improving and enhancing the efficiency of the joint audit, and thus enhancing the confidence of the parties concerned in the outputs of the audit process. As the research problem can be formulated through the following question: “Does the proposed model for disclosure of the role of the collective intelligence system contribute to improving joint auditing?”   

The proposed model is designed for the disclosure of joint auditing and the role

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation of a Parallel Stress-strength Model Based on the Inverse Kumaraswamy Distribution
...Show More Authors

   

 The reliability of the stress-strength model attracted many statisticians for several years owing to its applicability in different and diverse parts such as engineering, quality control, and economics. In this paper, the system reliability estimation in the stress-strength model containing Kth parallel components will be offered by four types of shrinkage methods: constant Shrinkage Estimation Method, Shrinkage Function Estimator, Modified Thompson Type Shrinkage Estimator, Squared Shrinkage Estimator. The Monte Carlo simulation study is compared among proposed estimators using the mean squared error. The result analyses of the shrinkage estimation methods showed that the shrinkage functions estimator was the best since

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (27)
Crossref (24)
Scopus Clarivate Crossref