The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.
The current research aims to: (know the effectiveness of the harvesting strategy in the achievement of the students of the Institute of Fine Arts in environmental art.
- In order to know this effectiveness, the researcher put a main zero hypothesis and derived six sub-hypotheses from it. the usual way; As the research community reached (120) male and female students of the Fine Arts Institutes for the morning study in Baghdad. As for the research sample, it was chosen by the simple random method, and the number was (75) male and female students for the year 2021-2022 AD. The researcher applied a pre-knowledge test for the four groups of research to find out the level of previous experiences of students in the subject of environmen
The two researchers selected the problem of research which represented with the following asking: Does the use of the shape of Round house strategy have effectiveness in the collection of students of the Department of Art Education of the subjectof teaching methods?
The research aims to "measure the effectiveness of Strategy shape of Round house in the collection of students of the Department of Art Education for the material teaching methods" and to verify the aim of the research two zeroassumptions was identified to measure the level of achievement in the subject of teaching methods of third stage students in the Department of Art Education –College of Fine Arts.
The research community included the students of Art Education Dep
The aim of the research is to explain the nature of the relationship between the dimensions of the strategic recovery of the service represented by (compensation, speed of response, apology, initiative (defining the problem) and the strategic goals of the company represented in (profitability, growth, community service, employee satisfaction) in the National Insurance Company, it has been approved The questionnaire as a tool to collect data and information from the sample of (58) who are in (department manager, M. department director, division official, unit official) and the statistical program (spss) was used in calculating (arithmetic mean, standard deviation, coefficient of variation, coefficient of Correlation, t-test, varia
... Show MoreThis research paper tries to show the significance of the narrative structure in the television advertisement and its connotations. The researchers chose the annual advertisement of Zain Mobile Telecommunication Company for the year 2020, which shed light on the global Corona pandemic crisis. The idea of the advertisement won wide approval as it focused on the suffering that everyone is witnessing like medical and security personnel in particular, and family relationships consequences.
In addition to the positive global interaction with the message presented by the Company in these exceptional circumstances. The advertisement, which lasted for 2.35 minutes, exceeded 13 million views in a short period of time. This prompted us to choos
The sports institutions in general are affected and contact with sport in particular the environmental factor, whether political or economic, which makes them in constant need to consider their administrative applications to increase the confidence of their employees because of their suitability or consistency with the new reality according to the sports activities that relate to it, The stalemate in administrative and technical aspects of the administrative work method in the majority of the Olympic sports federations makes the achievement of most of the goals far from the present reality, and the selection of suitable alternatives to achieve the objectives by those who disagree with the concepts of modern dictatorial standards It leads to
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show More