Preferred Language
Articles
/
jcofarts-226
The approach of deliberation in the ontemporary Iraqi theater text - theatricality Afwah-as a odel
...Show More Authors

The deliberative system of communicative studies is exposed to cultural openness, according to modern cultural studies, to establish a verbal language system that achieves reciprocal and cross-cultural relations. This research has examined the concept of deliberative approach in the contemporary Iraqi theater text by studying the deliberative system of text and its interrelationship with The stage of the verbal embodiment of the dramatic event, because the dramatic text achieves in its construction of racism, a deliberative approach between the verbal event and the language, and what later leads to the completion of the dramatic action. The research included four chapters. The first chapter was the systematic framework of the research, The problem of research and the need for automation, and the importance of research and its limits. The second chapter included the first topic (approach to deliberation - concept and rationale) and the second topic (Representations of approach to deliberation in the text of the world theater) The third chapter was adopted analysis of the sample of the elected research (mouths) of the writer Abdul Hussein Mahood. And chapter IV, which included findings, conclusions and a list of resource margins

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
International Medical Journal
Knowledge and Attitude of Iraqi Dentists towards the Use of Cone Beam Computed Tomography in Endodontics: A Questionnaire Study
...Show More Authors

Objective: The aim of this study was to assess the knowledge and attitude of Iraqi dentists towards cone beam computed tomography (CBCT) applications in endodontics by using an online survey. Materials and Methods: A questionnaire, consisting of 31 questions, targeted general dental practitioners and specialists in different dental specialities. A total of 306 participants were included. Data were assessed according to the frequency of distribution and the chi-square test was applied to analyse the difference in responses between two independent groups. Results: Among the participants 63.4% were using digital radiography in their daily practice, and 84% had awareness about CBCT's uses, with higher statistically significant responses among e

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
Onkologia I Radioterapia
The prevalence of lymph proliferative disorders in a group of Iraqi patients and its relation to blood indices parameters
...Show More Authors

Abstract: Lymphoproliferative Disorders (LPDs) are a group of neoplasms affecting various cells within lymphoid system. Each type has different treatment a..70619

View Publication
Scopus (1)
Scopus
Publication Date
Thu Dec 15 2022
Journal Name
Al-adab Journal
Anglicism as a source of language neologization
...Show More Authors

Одной из активно развивающихся отраслей лексикологии является неология, объект её изучения - новое слово или неологизм. В задачу неологии входит выявление новых слов и новых значений у уже существующих в языке слов, анализ причин и способов их появления, описание факторов, влияющих на появление нового в лексической системе языка, разработка языковой политики в отношении новых номинаций.  Лексикограф

... Show More
View Publication
Crossref
Publication Date
Thu Jun 15 2023
Journal Name
Bionatura
Copper-to-Zinc Ratio as an Inflammatory Marker in Serum of Iraqi Patients with Axial Spondyloarthritis
...Show More Authors

Axial spondyloarthritis (axSpA) is a chronic rheumatic inflammatory disease affecting mainly the spine and sacroiliac joints. Since the copper-to-zinc ratio (Cu/Zn) indicates an inflammatory response, the change in ratio is expected to correlate with axSpA. This study compared levels of Cu/Zn in the serum of axSpA patients. Serum samples were obtained from 53 patients with axSpA divided according to biological treatment into cohorts A and B, and 28 healthy control as cohort C. Serum levels of Cu and Zn were determined first by a fully automated chemistry analyzer TC-Matrix Plus, then the ratio was obtained. The elevated serum Cu concentration means of cohort B (189.32 ± 13.808 µg/dL) compared to cohort A (168.85 ± 7.244 µg/dL) a

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
Political Marketing and the Formation of Trends in Public Opinion on Social Networking Sites: An Analytical Study of the Two F.B. Pages: the Prime Minister and the Parliament President
...Show More Authors

The social networking sites have become one of the most important promotional instruments for their characteristic of facilitation of communication and the creation of public platform for discussion and formation of new points of view. These sites were used in the political marketing process where politicians use Facebook pages to promote their ideologies and spread their programs for the purpose of an influencing public opinion.
This research deals with the way by which political products are the Iraqi parliament. We adopt the methodology for analyzing the contents of these pages during three months starting from September,12 2016 to March 1, 2017 characterized by a lot of changes and events, in particular the beginning of the war o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Using Public and Private Cloud Computing in developing the Evaluation System of annual employees' performance at Iraqi Universities: A comparative study
...Show More Authors

Abstract

Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Banking Liberalization and its impact on Attracting Customers: applied research in a sample of Iraqi banks listed on the Iraq Stock Exchange
...Show More Authors

The research aims to shed light on banking liberalization and explain its impact on attracting customers, especially since Iraq adopted this policy after (2003) due to the changes that occurred, as the Central Bank of Iraq granted flexibility to banks in setting the interest rate on deposits and loans as well as allowing the entry of foreign banks in the local environment. The research relied on the analytical method for the dimensions of banking liberalization represented by (liberating interest rates, liberating credit, legal reserve requirements, entering foreign banks, privatization) as well as the factors affecting the attraction of customers, and a number of Iraqi banks listed in the Iraqi Stock Exchange were selected as a

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref