يعد مفهوم العولمة ظاهرة عالمية كونها نزعة طاغية في الوقت الحالي منسوبة الى العالم ، ولم تدخل بعد قوائم المفردات في القواميس السياسية والاقتصادية . (الأسدي ،2004-ص88).وأن العولمة " Globlization أخذت مدلولان ، الاول يدل على الانفتاح وحرية التفكير ومتابعة الاكتشافات في مختلف المجالات والابتعاد عن الرتابة والروتين . اما الثاني فيدل على سطحية التفكير وحب التغيير لأجل التغيير ونبذ الماضي دون حكم او تفكير مسبق . ( سلاح شور، 2000- ص2) . وتتعلق العولمة بالجوانب الاقتصادية والاجتماعية والسياسية والثقافية والتربوية والنفسية من حياة الانسان . وما يجابه به الباحثين لدراسة هذا المفهوم هو كيفية تقديره وقياسه ؟ وما الاد اة المناسبة لتحقيق هذا الهدف ؟ وكيف يمكن بناؤها ؟ لمعرفة تأثيره في العلاقات الإنسانية .ولعدم وجود دراسات سابقة درست تأثير وسائل اتصال العولمة في العلاقات الإنسانية في البيئة العراقية ، فأن ذلك يعد المشكلة التي تصدى لها الباحث في دراسته .
Abstract :
This present paper sheds the light on dimensions of scheduling the service that includes( the easiness of performing the service, willingness , health factors, psychological sides, family matters ,diminishing the time of waiting that improve performance of nursing process including ( the willingness of performance, the ability to perform the performance , opportunity of performance) . There is genuine problem in the Iraqi hospitals lying into the weakness of nursing staffs , no central decision to define and organize schedules. Thus the researcher has chosen this problem as to be his title . The research come a to develop the nursing service
... Show MoreThis research reviews the aesthetic variables that were founded according to (theatrical rehearsal) as one of the most important pillars on which the theatrical process is based, because of its necessity in developing theatrical art on several levels that helped the theatrical director in organizing his work, and this became clear through the research chapters represented in the first chapter (methodological framework) and the second chapter, which consisted of the first topic (the duality of watching / rehearsal) and the second topic (the applications of theatrical rehearsal in theatrical experiences), all the way to the third chapter (research procedures), which included the analysis of theatrical rehearsals (sharing on life), and the
... Show MoreAbstract Twelve isolates of bacteria were obtained from samples of different soils and water amended with 100µg/ml of five heavy metals chlorides (i.e: Aluminum Al+2, Iron Fe+2, Lead Pb+2, Mercury Hg+2 and Zinc Zn+2). Four isolates were identified as Bacillus subtilis and B. subtilis (B2) isolate was selected for this study according to their resistance to all five heavy metals chlorides. The ability of B. subtilis (B2) isolate for growing in different concentration of heavy metals chlorides ranging from 200-1200 µg/ml was tested. The highest conc. that B. subtilis (B2) isolate tolerate was 1000 µg/ml for Al+2, Fe+2, Pb+2, and Zn+2and 300 µg/ml for Hg+2 for 24hour. The effect of heavy metals chlorides on bacterial growth for 72 hrs was
... Show Moreهدفت الدراسة الى تحليل محتوى كتاب الرياضيات للصف الاول متوسط على وفق مكونات المعرفة الرياضية (المفاهيم الرياضية , التعميمات الرياضية, المهارات الرياضية والمسائل الرياضية )
وتفرعت منه الاسئلة الاتية :
مانسبة المفاهيم الرياضية المتضمنة في كل فصل من فصول كتاب الرياضيات للصف الاول متوسط وللكتاب ككل ؟
مانسبة المهارات الرياضية المتضمنة في كل فص
... Show MoreCloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreCarbon nanoparticles are prepared by sonication using carbon black powder. The surface morphology of carbon black (CB) and carbon nanoparticles (CNPs) is investigated using scanning electron microscopy (SEM). The particles size ranges from 100 nm to 400 nm for CB and from 10 nm to 100 nm for CNPs. CNPs and CB are mixed with silicon glue of different ratios of 0.025, 0.2, 0.05, and 0.1 to synthesis films. The optical properties of the prepared films are investigated through reflectance and absorbance analyses. The ratio of 0.05 for CNPs and CB is the best for solar paint because of its higher solar water heater efficiency and is then added to the silicon glue . Temperature of cold water and temperature of hot water in storage tank were ta
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThis research deals with the case of the Iraqi joint-stock companies listed on the Iraq Stock Exchange study in terms of compliance with the requirements of IAS 33 "Earnings per share" and the research problem Alrtash concentrated in a statement the commitment of those companies the requirements of the International Standard 33, which may adversely affect the quality of financial reporting where and in particular the quality of accounting information and content of the primary and secondary characteristics make them be of interest to the decisions of its users, so the aim of this research to the statement of financial reporting earnings per share on the quality of financial reporting in listed shareholding in Iraq Stock Exchange
... Show MoreBrainstorming is one of the fundamental and necessary concepts for practicing the auditing profession, as auditing standards encouraged the implementation of brainstorming sessions to reach reasonable assurance about the validity of the evidence and information obtained by the auditor to detect fraud, as the implementation of brainstorming sessions and the practice of professional suspicion during the audit process lead to increase the quality of auditing and thus raise the financial community's confidence in the auditing profession again after it was exposed to several crises that led to the financial community losing confidence in the auditing profession.
The research aims to explain the effect of brain
... Show More