0
This research is aimed at identifying the communicative habits and the impact of the content on the communicative process, especially the youth audience, which is one of the most important categories to which the advertisement is directed, as young people face life with passion and aspiration that make then responsive to all the influences used by the media in designing advertisements which use all the techniques and methocls to attract young people, such as relying on drama , artistic tricks, musical phrases and advertising slogans that respond to the desire of young people in entertainment.
The research aims to identify the reflection of television advertising and its impact on the development of the cognitive abilities of universi
APFS Mohammed, 2014
Villages in most rural areas of the developing world, including Iraq, suffer from a deterioration in the urban structure in its various aspects, both in the lack of internal planning in terms of residential unit design which is not commensurate with the sustainable health life, in addition to the lack of infrastructure and community services networks As well as road networks linking them to neighboring urban centers, which was accompanied by the emergence of other problems, including the desire of the population to migrate to neighboring cities and the deterioration of economic activities due to lack of activation of economic development plans (Rural villages suffer from a lack of interest in urban development within the regional spatial
... Show MoreA Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization
... Show MoreImpact Resistance training with and against the trajectory of the motor in some physical abilities and the BioA 100-meter, mechanical racing run for young people. That Training Jogging for different distances Melt -Rubber ropes According to direction and reversed movement With Obligations To the border of scientific of components Pregnancy Training represents to a training trend Aimed To Events Developments In The link between Starting and running, According to the specific mechanical requirements Have It Of Development of force Explosive and quick and their components which To give Border To the level Special speed for Stages Sprint run 100 m and amounts Efforts Required instantaneous powers. Noted Researcher In That Over there Repeat For
... Show MoreA novel planar type antenna printed on a high permittivity Rogers’ substrate is proposed for early stage microwave breast cancer detection. The design is based on a p-shaped wide-slot structure with microstrip feeding circuit to eliminate losses of transmission. The design parameters are optimized resulting in a good reflection coefficient at −10 dB from 4.5 to 10.9 GHz. Imaging result using inhomogeneous breast phantom indicates that the proposed antenna is capable of detecting a 5 mm size cancerous tumor embedded inside the fibroglandular region with dielectric contrast between the target and the surrounding materials ranging from 1.7 : 1 to 3.6 : 1.
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper