This research focuses on the services provided by news websites (IMN, Youm7, Huffington Post Arabic) to its audience of Internet users, as well as materials posted through its pages, trying to monitor and explain them to identify their types & features, and it›s functions, whether informational or non-informational, to know the technical potential of each of the news sites, with the entry of the latest technology information. The research used the analysis method to achieve the research objectives within the period from 1/1 to 31/1/2017. The researchers used the content analysis tool as a research tool to analyze the news sites and to know the services they provide through their pages. The research was divided into three parts, the first of which dealt with the methodological aspects represented by the research problem, its importance, objectives, the second part consisted of a theoretical framework for the most prominent services provided by news websites and digital newspapers via the web. The third and final part included a presentation and explanation of the results of the analysis using statistical methods. The researchers concluded with a series of conclusions, the most prominent of which were: The news sites, in close proportion, provided a range of news, interactive and guide services, and other services that facilitate the user access to the site and the materials published through its pages and sections. However, the analysis showed the superiority of the Huffington Post Arabic site on the IMN and Youm7 in terms of providing the press archive service for the published stories, but this does not mean the disappearance of the published stories on the two sites, but is available and available when the user wants to access it by using engines search. The researchers recommend that news sites take care of the services they provide to their audiences, to achieve interaction and integration between the published content and the reader, to get a high-efficiency experience within the news website.
The Research dealt with the role of the target costs in reducing the cost of products in the General Company for soft drinks. One the modern approaches reduce costs and thus increase the ability and continuity to compete in the market. Where the problem of research in identifying the shortcomings in the traditional method used in the company sample research. Which led to a weak control of the cost and the researcher relied on data and costs of the company. The research recommended that the target cost of the company should be applied to the research sample. Training the employees. In addition, preparing training courses for them. He stressed the need to address obstacles that prevent the existence of an effective cost system. Including t
... Show MoreThe research aims to study and definition of the concept of creative accounting and motives adopted by the management of companies to achieve their own goals and their impact on the reliability of the financial statements and the tax settling accounts and whether that tax administration is able to detect and limit the creative accounting practices and impose legal sanctions deterrent against companies The research has come to a set of conclusions, including:
- The administration motives in the use of creative accounting methods, some internal motives related to the interests of the administration in maximizing profits to increase incentives and rewards, others are external, such as the impact on stock prices or reduce the am
This study aimed to identify the political factors influencing the performance of specialized journalists in Iraqi electronic newspapers. The significance of the study stems from the role of communication in newspapers that have established themselves in reality due to their wide dissemination, multiple uses, expanding freedom base, and the current diversity in perspectives. These newspapers highlight and publish societal issues of concern. The importance of these newspapers is associated with their creators who face various factors affecting their value and performance, whether positively or negatively. In light of this, the political factor was identified as the primary driver for other influencing factors. The
... Show MoreThis study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.
The problem of research was the lack of research that dealt with issue of the job design approach that is more suitable for knowledge work, therefore, the research aims to determine the impact of job enrichment, and knowledge capitalon strategic success, starting from the hypothesis that there significant impact of job enrichment and knowledge capital on strategic success, to achieve this goal the researchers from the theoretical literature and related studies conclude to the construction of the scheme shows the hypothetical relationship between the variables, which was adopted job enrichment as independent variable while knowledge capital plays two roles, the first as an independent variable and the second as an intermediate
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreFace recognition, emotion recognition represent the important bases for the human machine interaction. To recognize the person’s emotion and face, different algorithms are developed and tested. In this paper, an enhancement face and emotion recognition algorithm is implemented based on deep learning neural networks. Universal database and personal image had been used to test the proposed algorithm. Python language programming had been used to implement the proposed algorithm.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More