Information Technology has become one of the Most Prominent tools in the Era of Technology and Telecommunication of our Digital World. For that Reasons most Organizations had taken the tools Adapted to their Present and Future Directions and for the Improvement for it's Operations and Workability in Internal or External Enviroment. Consequently the Points of Strength Beats the Weakness and as Result of Increase Opportunities and Decrease the Threats Facing these Organizations. This Search has been made to test the Existence or not Existence role of the Information Network Technologies that Include {Internet and Extranet} in Application of Information Technology that Include {Electronic Purchasing and Electronic Marketing}. We Depended Upon Case Study and Check List; we got from then the Data and the Needed Information to be analyzed to reach the result of this Search. This Search Reached a Very Important Conclusion that Include the Existence of role of Information Network Technologies in Application of Information Technology. This Search Recommend that the Company must Special Attention to Internal Network (Intranet) as well as given a Great Role to Information Technology Application Represented in (Electronic Purchasing and Electronic Marketing).
ملخـــص البحــــث
طبيعة البحث تهدف الى بيان دقة اختيار السياق القرآني لألفاظه فكل لفظة لايمكن ان يسد مسدها لفظ آخر وان كان مرادف له في الدلالة الا ان هناك من الفروق الدلالية الدقيقة بين تلك الألفاظ حتمّت على النص اختيار الفاظ دون سواها وكيف ان للسياق الدور الاكبر في هذا الاختيار
يهدف البحث الى:تغطية الافاق الهندسية لمتغيرات الاضاءة في المؤسسات العامة والخاصة والمتمثلة بـ (التباين ونسبة الاضاءة والسطوع ووقت الرؤية ودرجة الانعكاس) وتأثيرها في عملية الادراك البصري المقترن براحة الرؤية للمستخدمين
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe research considers The Analysis Dimensions of The organizational citizen ship Behavior for a sample of the Faculty of the university of Baghdad through the five Dimensions of citizenship ((Altruism– couscientiosness– sportsmanship courtesy– civic virtue))
The sample contains (120) professor from four colleges of the Baghdad university.
The most Important conelusion is the rise of citizenship behavior level for the Iraqi professor through his generaliaed compliance for most dimensions of the citizenship behavior the most important recommanelations presenteel in research is the encouragement and development for this behavior because of its oby viosis impact on the p
... Show Moreهدفت الدراسة إلى قياس النشاط الكهربائي (المعدل والقمة) للعضلة الصدرية العظيمة لجهتي اليمين واليسار في تمرين الضغط على المسطبة المستوية باستعمال الأثقال الحرة وجهاز سميث، والتعرف على الفروق في النشاط الكهربائي للعضلة الصدرية العظيمة اليمين واليسار في تمرين الضغط على المسطبة المستوية باستعمال الأثقال الحرة وجهاز سميث وفي الشدد (50% و 75% و100%). واستعمل الباحث المنهج التجريبي بأسلوب المقارنة. وتم اختيار عينة
... Show MoreThis research aims to demonstrate the impact of the going concern assumption in different accounting applications to provide a realistic look and more accurate result of activity and financial situation, as well as determining the responsibility of the Company's administration in compliance with the going concern assumption during the preparation for their financial statements, and to clarify the concept of integration between internal audit and external audit about going concern assumption, besides its importance and usefulness on the work of both of the internal auditor and the external auditor, as well as on the company under auditing process.This research purports preparing an internal audit program, including a set of auditing actio
... Show Moreفن الزخرفة في حياة وادي الرافدين
لعلنان نق اأ اّاد أَ ثرالشم تَ ام يلثهاتس يل هامني ا يل ب نال س ييننانن ب د اّاد ين ا يلنال ني نا ي
تنن عل ينني مَ ينط يئني، يلقد قنقج ع طمنق ي ق ن ب ييننن ثع يلأحليث على اّأ يلحنلاي يل و هاع مأني يلقاد
نضعُ ن ش ن نّهن عنلثن نُرأ مُ يلأحلي ش ث دّ ذ ن طمنقيٍ نل ني.
حلُ يلعل م ييننننني يلقد قهقبم ل ي مناي يل ب نال س يلش هامت ققالنم يلش نانئد يلأل ي يلقاد ى قُعناى ق ننام
يل ش نال س يل و نال د لاى يين ان د شّ حناب، اد نىمق
الفاظ القرأن المجيد في الديوان الفرسي