Preferred Language
Articles
/
jcofarts-649
Transformations in The Process of Mass Communication Using the International Network of Information (Internet): انتصار رسمي موسى
...Show More Authors

Summarized the idea of research is marked by "changes in the process of mass communication by using the international network of information" by specifying what data networking and mass communication is the transformation processes in the mass communication network where research aims to:1. Diagnostic data and transformations in the process of mass communication network.2. Provide a contact form commensurate with the characteristic mass of the International Network of electronic information, and research found to provide a communicative model called the (human contact network). In short (HCN) Humanity Communication Net also reached conclusions concerning the search process and communicative transformations and changes that have taken place by (the Internet).1 - Turned the process of public communication in the digital age, the era of the international network of information, bringing a focus on the (the means) instead of (the message) and achieved (the means) creativity in the process of transferring messages connectivity and communication process in general. And so true prophecy (McLuhan), where he said,”the importance of the message lays in a way it transfer."2 - It is a system with two-way.3 - The sender's effective and can be a receiver and sender at the same time.4 - The future is positive and interactive participant.5 - The means of communication, networking means (vehicle) and multi-media.6 - The process of communication is reciprocal between the source and the receiver.7 - Transfer the messages and data in digital form using (0.1) in the representation.8 - Selective communication of messages by the receiver.9 - Digital communications over the Internet is characterized by (interactive).10 - Electronic communication to achieve the promotion of the message because of communication Interactive Communication Multimedia.11 - The environment clean and safe communication as confusion factors weaken.12 - Public communication is characterized by enrich of the in formations are wide and overlapping.13 - Contact become a (contact computerized), Com-com computer communication

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Iraqi Journal Of Science
EFFECT OF LAND DEGRADATION DEGREE ON THE LAND COVER TYPE USING GIS TECHNOLOGY IN THE WEST OF BAGHDAD/IRAQ
...Show More Authors

In this study is the phenomenon of desertification risk assessment in the Abu Ghraib area west of Baghdad/Iraq, which has an area of about (384.168 km 2), that the annual mean temperature is more than (22 C). Rainfall was low, ranging from the (200 mm) per year for Iraq and (2.82) mm per year of the study area* temperature is high and evaporation is also high (mm 7.73) per year*, so the climate in general of the dry type and the system of soil moisture is the kind of Aridic (Torric). To this study was to identify three indicators to monitor for the period from 2001-2005 using GIS and these indicators are (soil, groundwater and the nature of land use), using ArcGIS 9.1. The results showed that the risk of desertification was part of the leve

... Show More
View Publication
Publication Date
Mon Feb 02 2026
Journal Name
Journal Of Physical Education
The Effect of Using Teaching Aid on the Development of Straight Forehand and Backhand Shot Performance in Lawn Tennis
...Show More Authors

The problem of the research lies in finding aiding means that improve and facilitate learning artistic skills during the main part of a teaching sessions due to their great importance in developing the accuracy of forehand and backhand skills in tennis. Players are usually faced with difficulties at the beginning of learning due to lack of coordination in ball striking thus including a teaching aid will have a positive effect on learning some forehand and backhand skills. The research aimed at designing exercises using teaching aid in tennis as well as identifying the effect of these exercises on the accuracy of performing forehand and backhand shots in tennis. The researcher used the experimental method on (38) tennis players from Al Zewra

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Use of One-Way Multivariate Analysis of Variance in the Impact of the Database on the Fields of Banking Service in Some Iraqi Banks
...Show More Authors

 The purpose of this paper is to recognize the impact of database levels on fields of banking service (provision of remittance services and transfer of funds, save financial deposits, provision of personal loans services) in some of Iraqi banks using one-way multivariate analysis of variance. The paper population consisted of (120) employees, then a random stratified sample of (104) employees was taken. A questionnaire paper consists of (24) items were designed in order to analyze by one-Way multivariate analysis of variance (MANOVA) using SPSS.One of the main findings of the current paper is that there is an impact of database on fields of banking service in Iraqi banks (Al Rafidain and Al Rasheed).

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 15 2021
Journal Name
مجلة العلوم القانونية والسياسية
الحماية الجنائية لأمن الدولة الداخلي في ظل حروب الجيل الرابع
...Show More Authors

تناول البحث موضوعاً شديد الأهمية وهو الأمن الاجتماعي منظور اليه في سياق الحماية الجنائية لأمن الدولة والتحديات التي يتعرض لها بعد حصول تغيير حاسم في أساليب الحرب. كما يقدم البحث تقسيماً مختلفاً لأجيال الحروب نقتصر على اربعة منها استناداً إلى التغيير في أهداف الحرب الاستراتيجية وليس إلى مجرد وسائل ارتكابها لان هذه الوسائل لا تصلح لوصف التغييرات الحقيقية في أنماط الحروب والاهداف التي تسعى إلى تحقيقها. ويؤكد

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
دور مراقب الحسابات في ظل تكنولوجيا المعلومات المعقدة ومخاطر التدقيق
...Show More Authors

بدأت الشركات تخطو خطوات متسارعة  باستخدام أنظمة تكنولوجيا المعلومات في عملياتها المالية وباعتماد قليل على الورق والذي يتم الاحتفاظ بالنسخ الأصلية منه تعزيزا للإجراءات التي تمت معالجتها الكترونيا. إن ممارسة الشركات وبشكل متزايد الأسلوب الواقعي (Virtualization) في علاقاتها مع الموردين والمستهلكين والشركاء أدى للحاجة المتزايدة للثقة والتأكيد على مثل هذه العلاقات مما يولد ضغطا  كبيرا ع

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Ieee Sensors Journal
Calibrating Distance Sensors for Terrestrial Applications Without Groundtruth Information
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using Tools Lean Accounting to Reduce the Costing: An Applied Research in General Company for Electric Industry
...Show More Authors

The developments accelerated in technology and rapid changes in the environment and increase numbers industrial countries and different desires and requirements of customers, lead to be produced in large quantities is not feasible due to changes listed above as well as the need to product variety and change in tastes and desires of consumers, all above led not to enable companies to discharge their products in the case of mass production and created the need to devise ways and new methods fit with the current situation, and accounting point no longer the traditional accounting systems able to meet the requirements needed by the companies to make decisions and know where waste and loss of resources resulting to invent new style away from

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Design Considerations of Laser Source in a Ring Network Based on Fiber Distributed Data Interface (FDDI)
...Show More Authors

This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode

... Show More
View Publication Preview PDF