Preferred Language
Articles
/
jeasiq-1493
دور التمويل الذاتي في إعادة اعمار الوحدات الحكومية غير الهادفة للربح "دراسة تطبيقية في كلية الإدارة والاقتصاد/ جامعة بغداد"
...Show More Authors

The Iraqi non profit governmental units are facing great financing challenges in providing the money required for reconstructing the damages occurred after 9th of April 2003.

Related to that, This research, which is contained of studying the self – financing experiment in non profit governmental units which is considered one of the financing alternatives that contribute in providing the required money to meet the shortage of central finance; and creating the economic exploitation for the resources and possibilities achieved by the non profit governmental units themselves for the purpose of employ them in reconstruction and to reduce the burden on the public budget which is responsible of financing the activities of these units through the central financing.   

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The predictive capacity of Coronavirus Impacts with Psychological Adjustment among University Students in Oman
...Show More Authors

The present study was designed to determine the predictive capacity of Coronavirus’s impact, as well as, the psychological adjustment among university students in Oman. A total of (566) male and female students were employed to form the swtudy sample. The descriptive method was used. The findings showed that there is a significantly university student affected by Coronavirus; the dimensions of scale were arranged as follows: the Academic requirements of pandemic came first, the social communication came second, and the academic future stress came in third. The results also showed that Psychological Adjustment among University Students was affected by the Coronavirus pandemic, the average was low. Also, the result showed that the Corona

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
An excerpt on the analysis of correlate constructions: Exkurs zur Analyse der Korrelatkonstruktionen
...Show More Authors

The main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
" أنعكاس تبني المعيار المحاسبي الدولي رقم ( 2 ) للقطاع العام على بيان التدفق النقدي "
...Show More Authors

يعد بيان التدفق النقدي من البيانات المهمة الصادرة من الوحدات الحكومية غير الهادفة للربح، بعد تبنيها معايير IPSASs ، مما يوفر معلومات اوسع تلبي حاجات المستخدمين لأتخاذ القرارات المناسبة . أذ يتضمن بيان التدفق النقدي بموجب المعيار رقم ( 2 ) التدفقات النقدية حسب الأنشطة التشغيلية و الاستثمارية والتمويلية ، وهذا لا ينسجم مع مخرجات النظام المحاسبي الحكومي العراقي . وان هدف البحث هو  التعرف

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the rebound effect and interactive between fiscal and monetary policy on the General economic equilibrium (IS-LM)
...Show More Authors

      Will address this research interaction and coordination between fiscal and monetary policies and the impact of this interaction and coordination on economic stability and growth، and how the financial implications of monetary policy may stimulate action monetary policy and treatment side effects and the nature of responsiveness and bounce between procedures both two policies and their impact on the balance of overall economic and explained in the folds of searchjustifications coordination and the extent necessary in order to address the imbalances in economic activity through twinning actions of monetary and fiscal، has embodied this coordination and interaction between policies and their impact m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
(Generalized Anxiety Disorder among Students of Baisc Education in Unv of Sulamina)
...Show More Authors

The current research aims to measure Generalized Anxiety Disorder among students of the University of Sulaymaniyah / College of Basic Education, and to identify the significance of differences between sex, scientific specialization and age, and for that reason, the research sample of (102) male and female students was chosen in a random manner, and the researcher used the diagnostic criteria for the generalized anxiety disorder contained He mentioned it in the Statistical and Diagnostic Manual of Psychiatry, and the paragraphs of the scale were formulated according to those standards after they verify the conditions of honesty and consistency, and the use of appropriate statistical means. The results of the research indicated that genera

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2026
Journal Name
Lark
استقصاء تمييز ونطق طلبة الكليات العراقيين متعلمي اللغة الإنكليزية لغة اجنبية لتسلسلات الأصوات الإنكليزية الصحيحة Investigating the Iraqi EFL Students’ Recognition and Production of English Consonant Sequences
...Show More Authors

English allows for consonant sequences at the beginning of words, which poses a challenge for speakers of other languages, especially those whose native languages do not contain such sequences, such as Arabic. Therefore, this study aims to investigate students’ recognition and production of initial consecutive consonants in relation to gender, and the significance of the statistical differences between students in recognition and pronunciation of consecutive consonants. Consequently, a cohort of fifty-two Iraqi college students (18 males and 34 females) were selected as a sample. A multiple-choice test of two phases was used as a research instrument. The results showed that females outperformed males in recognizing and producing c

... Show More
View Publication Preview PDF