The research aims to know the traits or characteristics of woman in terms of her external
appearance, motives for her behavior, feelings, mood and ability.
It, moreover, seeks woman’s relationship with others as it is presented by the Iraqi
satirical television show “ State of Melon “.
The researcher adopted for that survey approach using the method of content analysis
to study the research sample represented by “ State of Melon “ show which was
exposed through the screen of a group of channels:
“Hona Baghdad Satellite Channel, then Asia Satellite Channel, Dijla Satellite Channel,
and UTV Satellite Channel.”For this, the researcher used Margaret Gallagher’s Model to analyze the image of
woman in the Show episodes, which amounted to (132) episodes, divided into (the
second season - and the pre-season episodes of the third - and the third season - and
the fourth season - the fifth season).
In the light of this study, the researcher reached a set of results, which are:
1.The woman appeared dependent in her relationship with others, in addition to being
anxious and aggressive in her mood and feelings.
2.The woman image is considered among the hesitant and volatile characters of the
group of competence and capacity characters on the show.
3. At the forefront of the motives for woman›s behavior in the «State of Melon» Show
was that woman was driven by her feelings, while her outward appearance was dominated
by rudeness.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreAutorías: Imad Kadhim Khlaif, Israa Gameel Hussein, Talib Faissal Shnawa. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 5, 2022. Artículo de Revista en Dialnet.
The research aims at shedding light on the impact of the organizational commitment on the performance of the Iraqi insurance company as a service company that provides many services to customers both internal (individuals working) or external, Whenever the company was able to adopt new concepts to increase the understanding and knowledge of how their attention to individuals working and to provide an appropriate working environment, and to clarify the objectives and strategies for them, and create a sense of their importance, as reflected on job performance in attracting new customers, and build long-term relationships with them . In order to achieve this, the research relied on the questionnaire as a main tool for collecting data and in
... Show More
Abstract
Due to the lack of previous statistical study of the behavior of payments, specifically health insurance, which represents the largest proportion of payments in the general insurance companies in Iraq, this study was selected and applied in the Iraqi insurance company.
In order to find the convenient model representing the health insurance payments, we initially detected two probability models by using (Easy Fit) software:
First, a single Lognormal for the whole sample and the other is a Compound Weibull for the two Sub samples (small payments and large payments), and we focused on the compoun
... Show MoreThe process of coordination and joint cooperation between SAIs and internal auditors in the public sector is considered one of the very important matters in performing efficient audits and are of high quality, especially if this coordination and cooperation is implemented in accordance with international standards, as it leads to avoiding duplication in auditing work. And the distribution of work in a distribution that achieves the objectives of auditing in general and is of general benefit to the economic unit.
The research problem lies in the weakness of the relationship between internal auditing and external auditing as a result of not applying INTOSAI Standard (9150) coordination and joint cooperation
... Show MoreThe main objective of the central bank is to achieve price stability and target in fractionates. Therefore, the bank sought to use modern tools and policies in order to reduce the negative effects of the accumulation of foreign reserves represented by monetary sterilization, similar to developed and developing countries alike, but with different available tools that are possible and imposed by the local financial and monetary environments, such as the window for buying and selling foreign currency, open market operations and deposit facilities. And lending existing. Because any in crease in the monetary base resulting from the accumulation of foreign reserves will affect price stability directly due to the consumer nature of the
... Show MoreThere are many tools and S/W systems to generate finite state automata, FSA, due to its importance in modeling and simulation and its wide variety of applications. However, no appropriate tool that can generate finite state automata, FSA, for DNA motif template due to the huge size of the motif template. In addition to the optional paths in the motif structure which are represented by the gap. These reasons lead to the unavailability of the specifications of the automata to be generated. This absence of specifications makes the generating process very difficult. This paper presents a novel algorithm to construct FSAs for DNA motif templates. This research is the first research presents the problem of generating FSAs for DNA motif temp
... Show More