Preferred Language
Articles
/
jcofarts-639
Diversity of design methods for global competitive advertising: عمار صباح شاكر ناجي
...Show More Authors

As a result of the development and global openness and the possibility of companies providing their services outside their spatial boundaries that were determined by them, and the transformation of the world due to the development of the means of communication into a large global market that accommodates all products from different regions and of the same type and production field, competition resulted between companies, and the race to obtain the largest market share It ensures the largest amount of profits, and it is natural for the advertising promotion by companies for their product to shift from an advertisement for one product to a competitive advertisement that calls on the recipient to leave the competing product and switch to its product offered by the advertised company, at the expense of the competitor who shares the revenue of profit in the same field Hence, the importance of this type of advertising has grown, as it presents a highly cultured promotional visual language that is designed in a style that has a lot of intelligence (power in offering and influence in receiving). By revealing such an important kind of promotion, the research will attempt to answer the following question: (What are the design methods used in the global competitive advertising environment?), while its objectives were set in revealing the design methods for competitive advertisements in major international commercial companies. The researcher moved to analyze selected models that showed results, most notably: the formal borrowing method achieves more absorption in the absorption of competitive advertising and thus attracts more attention. The success of the producers in the stock market. To arrive at the most prominent recommendations: Training the technical staff and informing them of the most important methods that can be implemented in the commercial markets in support of the national product in competition with the foreign product. A proposal at the end of the research a study entitled "Studying the impact of the reality of commercial competitive advertising on the national economy"

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Tax Planning Policy Directions for The Development of The Tax Outcome in Iraq for The Years (1990- 2010): An Applied Research at The General Board of Taxes
...Show More Authors

The importance of research is to be considered by highlighting the tax policy in Iraq which extended for successive measurement of the amount of tax receipts for respective periods, the research problem represents security, economic and political issues that Iraq suffered which were very difficult since Nineties of the last century until now that led to a lake of clarity in tax policy trends, volatility in it and finally reflected on the tax revenues increase or decrease. One of the main recommendations of the research is: (The necessity to develop a deliberate strategy for tax policy in Iraq which should take into account financial, economic, and social goals in appropriate way).

View Publication Preview PDF
Crossref
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Suggested Technique for Creating Physical Growth Curves Charts for Anthropometric Measurements in Admixed form in a sample of children under two years of age In Diyala Governorate
...Show More Authors

Objective: This study aimed to assessing new suggested technique of Physical Growth Curves (PGC) charts in
children under two years old of a non-probability sample.
Methodology: A non-probability sample of size (420) children under two years selected from 12 Primary
Health Care Centers in Diyala governorate during the period from 15th Nov. 2010 to 13th Mar. 2011
according to admix of a different properties together in one chart/or growth curve chart included in at least
weight, Height, and Head circumference.
Results: the results showed different properties that can be admix together in one chart/or growth curve
chart included in at least weight, Height, and Head circumference. And to overtake the problem of the norm

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 06 2017
Journal Name
International Journal Of Science And Research (ijsr)
The Conceptual Mathematical Knowledge and Analytical Thinking for the First Stage Students at Math Sciences Department, Faculty of Education for Pure Sciences, IBN Alhaithem, University of Baghdad
...Show More Authors

Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy Robust Estimation For Location Parameter
...Show More Authors

 In this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.

View Publication Preview PDF
Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Construction Bullying scale for Kindergarten child
...Show More Authors

Construction of photographed bullying scale of kindergarteners was the aim of this study. The study conducted to answer the raised question, could the bullying among kindergarteners be measured?. A total of (200) boy and girl were selected from city of Baghdad to be the sample of the study. The scale composed of (27) item with colored pictures. It takes about (15) minuets to answer the whole scale items. SPSS tools were used to process the collected data. The result showed that the bullying among kindergarteners could be measured.

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Human Computer Interface for Wheelchair Movement
...Show More Authors

This paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Proposed Algorithm for Gumbel Distribution Estimation
...Show More Authors

Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu

... Show More
Preview PDF
Crossref