Preferred Language
Articles
/
jcofarts-649
Transformations in The Process of Mass Communication Using the International Network of Information (Internet): انتصار رسمي موسى
...Show More Authors

Summarized the idea of research is marked by "changes in the process of mass communication by using the international network of information" by specifying what data networking and mass communication is the transformation processes in the mass communication network where research aims to:1. Diagnostic data and transformations in the process of mass communication network.2. Provide a contact form commensurate with the characteristic mass of the International Network of electronic information, and research found to provide a communicative model called the (human contact network). In short (HCN) Humanity Communication Net also reached conclusions concerning the search process and communicative transformations and changes that have taken place by (the Internet).1 - Turned the process of public communication in the digital age, the era of the international network of information, bringing a focus on the (the means) instead of (the message) and achieved (the means) creativity in the process of transferring messages connectivity and communication process in general. And so true prophecy (McLuhan), where he said,”the importance of the message lays in a way it transfer."2 - It is a system with two-way.3 - The sender's effective and can be a receiver and sender at the same time.4 - The future is positive and interactive participant.5 - The means of communication, networking means (vehicle) and multi-media.6 - The process of communication is reciprocal between the source and the receiver.7 - Transfer the messages and data in digital form using (0.1) in the representation.8 - Selective communication of messages by the receiver.9 - Digital communications over the Internet is characterized by (interactive).10 - Electronic communication to achieve the promotion of the message because of communication Interactive Communication Multimedia.11 - The environment clean and safe communication as confusion factors weaken.12 - Public communication is characterized by enrich of the in formations are wide and overlapping.13 - Contact become a (contact computerized), Com-com computer communication

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Numerical Solution of Fractional Volterra-Fredholm Integro-Differential Equation Using Lagrange Polynomials
...Show More Authors

In this study, a new technique is considered for solving linear fractional Volterra-Fredholm integro-differential equations (LFVFIDE's) with fractional derivative qualified in the Caputo sense. The method is established in three types of Lagrange polynomials (LP’s), Original Lagrange polynomial (OLP), Barycentric Lagrange polynomial (BLP), and Modified Lagrange polynomial (MLP). General Algorithm is suggested and examples are included to get the best effectiveness, and implementation of these types. Also, as special case fractional differential equation is taken to evaluate the validity of the proposed method. Finally, a comparison between the proposed method and other methods are taken to present the effectiveness of the proposal meth

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
TREATMENT OF SYMPTOMATIC CERVICAL ECTOPY USING CO2 LASER (10600 nm) – Case Study
...Show More Authors

Background: Cervical ectopy advanced to erosion is one of the common conditions in gynecological and pathological study. It is considered as a physiologic condition resulting from columnar epithelium migration from the cervical canal into the vaginal portion of the cervix, in which no treatment for asymptomatic cervical ectropion can be given. Treatment can be accomplished via thermal cauterization (Electro cautery), Cryosurgery. CO2 laser therapy is another modality of treatment.

Objective: To study the effectiveness of CO2 laser therapy and evaluate it as a biomedical tool for the treatment of cervical ectropion. The study was done at Laser Medicine Research Clinic at the

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Numerical Solutions of Two-Dimensional Vorticity Transport Equation Using Crank-Nicolson Method
...Show More Authors

This paper is concerned with the numerical solutions of the vorticity transport equation (VTE) in two-dimensional space with homogenous Dirichlet boundary conditions. Namely, for this problem, the Crank-Nicolson finite difference equation is derived.  In addition, the consistency and stability of the Crank-Nicolson method are studied. Moreover, a numerical experiment is considered to study the convergence of the Crank-Nicolson scheme and to visualize the discrete graphs for the vorticity and stream functions. The analytical result shows that the proposed scheme is consistent, whereas the numerical results show that the solutions are stable with small space-steps and at any time levels.

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
The effect of the significance of the Qur'anic context in the allocation of the year
...Show More Authors

Acting on the Holy Qur’an by contemplating its meanings, stopping at its commands and prohibitions, and everything in it that guides us to truth and mercy. The Holy Qur’an includes it for various purposes in one verse, and there is no doubt that this is part of the perfection of this great book, and one of the sciences of the fundamentalists is the indication of the context, and it is a great science of high rank, and it is one of the most important things that lead to the correct understanding of the miraculous and decisive book of God Almighty, and one of the best meanings of the Qur’an It was not from the context of the verses, and from here it can be said that the indication of the context is one of the origins of deriving lega

... Show More
View Publication Preview PDF
Publication Date
Tue May 10 2022
Journal Name
Himalayan Journal Of Economics And Business Management
Information Systems Ethics and Its Role in Achieving Banking Discrimination Analytical Research in a Sample of Private Banks
...Show More Authors

The research aims to shed light on the ethics of information systems and their role in achieving banking excellence for a sample of private banks in the province of Baghdad. It is important to focus on studying the ethics of banking information systems, which has become one of the most important basic and strategic resources that banks rely on to achieve outstanding performance. Achieving banking leadership in the Iraqi banking market. The researchers adopted the descriptive analytical approach to the research, and the questionnaire was considered as a main tool for collecting information in addition to personal interviews. The research reached the most important results that there is an acceptable correlation relationship between the ethic

... Show More
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Towards a new global leadership to combat international terrorism
...Show More Authors

In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology (jatit)
Factors and Model for Sensitive Data Management and Protection in Information Systems’ Decision of Cloud Environment
...Show More Authors

Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology

View Publication