The aim of the research is to identify the educational and psychological effects of the positive and negative aspects of using social networking websites. The researcher administered a number of questions to (250) users of different types of social networking websites. He analyzed his research results and obtained a number of results. The research has reached a number of recommendations and suggestion: Regulating the use of social media. Monitoring the parents of the sites used by children in a way that they do not feel they are observers. It is necessary to devote an hour daily to show the importance of real social life for children other than using social media. It is necessary to show the importance of choosing friends who have a good reputation. It is necessary to assign a little time each week to meet family outside the house or visit relatives that help children to communicate with other changing the electronic communication to the real social media. It is necessary to show television programs to alert young people to the dangers of addiction to the psychological and educational internet. It is necessary to prepare annual calendar posters that alert students in schools and universities to the type of risks, including the risks of incorrect use of the Internet. It is necessary to prepare an educational curriculum that is not intended for the exam and does not fall within the exams and grades in the schools and universities, as much as it aims to build psychological and educational values according to the customs and traditions of ancient Iraq.
The construction industry plays a crucial role in the countries' economy, especially in the developed country. This point encourages the concerned institution to use new techniques and integrate many techniques and methods to maximize the benefits. The main objective of this research is to evaluate the use of risk management, value management, and building information modeling in the Iraqi construction industry. The evaluation process aims at two objectives. The direct objective was to evaluate the knowledge in risk management (RM), value management (VM), and building information modeling (BIM). The indirect objective was to support the participants with information related to the main items mentioned. The questionnaire
... Show MoreConstruction joints are stopping places in the process of placing concrete, and they are required because in many structures it is impractical to place concrete in one continuous operation. The amount of concrete that can be placed at one time is governed by the batching and mixing capacity and by the strength of the formwork. A good construction joint should provide adequate flexural and shear continuity through the interface.
In this study, the effect of location of construction joints on the performance of reinforced concrete structural elements is experimentally investigated.
Nineteen beam specimens with dimensions of 200×200×950 mm were tested. The variables investigated are the location of the construction joints
... Show MoreNatural convection heat transfer is experimentally investigated for laminar air flow in a vertical circular tube by using the boundary condition of constant wall heat flux in the ranges of (RaL) from (1.1*109) to (4.7*109). The experimental set-up was designed for determining the effect of different types of restrictions placed at entry of heated tube in bottom position, on the surface temperature distribution and on the local and average heat transfer coefficients. The apparatus was made with an electrically heated cylinder of a length (900mm) and diameter (30mm). The entry restrictions were included a circular tube of same diameter as the heated cylinder but with lengths of (60cm, 120cm), sharp-edge and
... Show MoreThis study aims to create spatial balance between two Iraqi writers' novels (Maysaloon
Hadi, Alya Talib) technical and objective illustrates similarity points and difference in the
writers' style. We depended in our research on spatial classification considering the aggressive
and friendly, since the writers focused on them.
The research study concluded to many sides, some of which are similar and some are
different. Firstly, ingenuity description of the writers. Followed by the deep connection they
have. Because of the personal experience it emanated from alienation sensations and nostalgia
to deep roots to homeland.
On the other hand, difference aspects, we see Maysaloon takes symbols and illusions
unlike Aly
The current research aims to measure the level of entrepreneurial orientation and its dimensions (creativity, independence, proactivity, risk tolerance, and achievement) in the National Security Chancellery, as its importance and role in guiding senior leaders of the chancellery to make strategic decisions with high quality in various Iraqi concerns, more specifically the security aspect. The data was collected from 94 individuals (the research sample) from the research community (120) individuals at different administrative levels and intentionally where the questionnaire was adopted as a main tool for data collection and the primary data was analyzed through descriptive and inferential statistical methods (arithmetic mean, standard dev
... Show MoreThe aim of the research is to find out the methods of employing the : Infographics in the news sites due to the different communicative roles of the : Infographics . To achieve the research objective, the researcher used the survey method: the method of analyzing the content to analyze the : Infographics material from the selected sample of the news sites. What was said ? And how was it said? Through the design of a content analysis form that includes a number of studied analysis Infographics of the study.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThe United States has stood by Iraq and supported militarily and morally, but the relationship did not quickly be strained again before August 1990, when the oldest former political system in Iraq after Iraqi troops entered the territory of Kuwait, the United States stood beside Kuwait because the two parties link military ties opted States United to support the Kuwaiti side relying on the resolutions passed by the UN security Council, the United States and found in this issue right opportunity to execute the mechanics of meddling in Iraqi affairs and the various means of political, economic, military, and methods for dealing with Iraq, especially after finding the impediment standing in front of the implementation of its goals The strat
... Show MoreThis research aims to address the most recent international standard in the field of insurance contracts, the International Financial Reporting Standard (IFRS17) and the theoretical framework of the standard in addition to the most important characteristics of the standard (IFRS17), as well as to identify the paragraphs of the modern standard, with the challenges its application in general and the use of the approach (inputs - operations - outputs) to present the challenges of its application in the Iraqi environment and specifically in the environment of Iraqi insurance sector companies (government), the research is based on the main premise that the identification of the requirements for the application of the International Fin
... Show More