This study aims to identify both the importance of using (LinkedIn) and its drawbacks for researchers and specialists in the field of information and knowledge technologies. The study relied mainly on the statistical method (analytical method) from the collection of data tools (questionnaire) that was distributed electronically (Google Forms) to the sample community of (55) instructors. The feedback received illustrates that (46) instructors among those who participated in the questionnaire subscribed to (LinkedIn) and the rest did not. Their data was analyzed statistically, and the general arithmetic mean and the hypothetical mean was extracted for them to achieve the objectives of the study and prove their hypotheses. The site positively
... Show MoreTechnological and digital development has allowed the emergence of many methods of producing semantics on social media sites within semiotic and propagandistic frameworks. This is what made the image appear in different molds and shapes, especially as it is the first material for visual perception.
This made the Israeli propaganda discourse use it as an important tool to manage the content of suggestive messages with semiological connotations. By doing so, such tool uses social networking sites as an appropriate environment to achieve those goals, which are related to cases of manipulating emotions and minds. It, moreover, changes convictions, attitudes, trends and behaviors according to what the propaganda planner wants.
Many Isra
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThis study aims to answer the following question: Is a student who attaches to the social group strongly affected by social interaction and social status? The population of the study included a group of medical students at the University of Al-Kufa. To collect the required data, a scale of Social Group Attachment consisting of (25) items was administered to a sample of (600) students, (257) male students, and (343) female students. The results revealed that students do not have a high level of attachment to the social group and they have a fear of that. There are no significant differences between the levels of attachment between males and females. There are no significant differences regarding colleges, the four academic levels, a
... Show MoreThe current research seeks to shed light on the role that social media can play, through the optimal use of it by students, in achieving academic excellence. The most prominent aims that constitute it are:Identifying the social sites most used by students; learning how students interact with the published study material on communication sites and benefit from them to achieve their academic excellence; and knowing the connection between using social media and achieving academic excellence, and the role that these sites play in achieving academic excellence.That incorrect use by students leads to adverse results, and thus affects their academic level. Failure of parents to monitor their student’ use of social media leads
... Show MoreThis study aimed at identifying the extent to which the social worker used the techniques of group discussion in the professional practice with the groups of school activity in the schools of Tubas governorate in light of some variables (gender, years of experience, academic qualification). The analytical descriptive method was used due to its suitability for the objectives of the study. A questionnaire was designed to collect data that included (30) items, distributed in three areas .The validity and reliability of the tool were verified and then distributed to the study sample.
The results of the study showed that the highest averages were in the discussion stage domain, where the pre-discussion stage was m
... Show MoreThe continuous pressure of work and daily life and the increasing financial and social stress that Iraqi women are experiencing (both inside and outside Iraq) is one of the main causes of anxiety, particularly in those of working class women. This group of women carry the burden of carrying out multiple roles and responsibilities at the same time. All this collectively make them more prone to developing anxiety compared to men. In addition, the physiological and psychological nature of women, as females, on top of the other roles in life, like being a wife or mother or daughter or sister, all add extra pressure on women especially for those who are considered as productive working individuals in the society. In order to study the relatio
... Show MoreBackground: Emergency contraception (EC) is a general term used to describe drugs and devices that are utilized to prevent pregnancy following unprotected intercourse or in the event of contraceptive failure. This postcoital birth-control option is available by means of hormonal pills or copper-bearing intrauterine device.Objectives: The objectives of the study were to assess the women's knowledge regarding EC, to compare the knowledge of school teachers with other women in the community, as well as assessing the pre-post test knowledge of teachers.Type of the study: A cross sectional and quasi- experimental study.Methods: It was carried out in Duhok during the period from 20th of November 2014 to 6th of January 2015. A Simple and system
... Show MoreIn recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show MoreCitizenship education is the effective educational tool in building a citizen who is able to participate in building his country. This can only come through the educational efforts that teachers make in the classroom. Such a step requires teachers to have knowledge of citizenship education, its principles, and the foundations for its development. Thus, the study aims to examine the degree of social studies teachers' knowledge of the dimensions of citizenship education at the basic education schools in the Sultanate of Oman. It also aims to examine its relationship with a set of variables. The researchers used the quantitative descriptive approach to achieve the objectives of the study. It further adopted a test tool, which consisted in i
... Show More