The research aimed to modeling a structural equation for tourist attraction factors in Asir Region. The research population is the people in the region, and a simple random sample of 332 individuals were selected. The factor analysis as a reliable statistical method in this phenomenon was used to modeling and testing the structural model of tourism, and analyzing the data by using SPSS and AMOS statistical computerized programs. The study reached a number of results, the most important of them are: the tourist attraction factors model consists of five factors which explain 69.3% of the total variance. These are: the provision of tourist services, social and historic factors, mountains, weather and natural parks. And the differences of age groups and gender in their views towards tourist attractions. The research concluded a number of recommendations that could help the authorities in transforming the economy according to the vision of KSA (2030). These recommendations are: providing tourist attraction activities through a five main aspects, which are: the provision of tourist services, social and historic factors, mountains, weather and natural parks. And taking into account, the needs of gender and different age groups.
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The tensions and crises and the psychological pressure as well as the rapid changes and great development which is taking place in the present time. And witnessing community of wars and conflicts that give rise to future concern among members of the community in general and students in particular, as it included the current research a number of chapters, the First chapter contains the research problem, the important goal, then set researcher terminology that has defined and contained in the title of research in the form (concern the future, artistic expression, middle school). The Second chapter included three sections, the first included the nature of adolescence and traits, characteristics and pr
... Show MoreABSTRACT
The study aims to identify the level of health services provided in private suites to government hospitals from the perspective of the recipi
... Show MoreThis study aimed to develop scale of Selectiv Mutism with pupils of primary schools according to their teachers' view in Baghdad city (Karh and Resaf(.
Children might choose the mutism as the solution to avoid some psychological and social problems that surrounded them. Furthermore, this could consider as a disorder that could effect the child and led him to use the Selected Mutism.
This is supported by the pilot study which was conducted by the researcher on 150 teachers in different primary schools in Baghdad. The results revealed some symptoms were found with children who have selected mutism.
Because of there was no scale was found to measure the Selected Mutism, a scale was develop in order to measure t
... Show MoreThe improvement in Direction of Arrival (DOA) estimation when the received signals impinge on Active-Parasitic Antenna (APA) arrays will be studied in this work. An APA array consists of several active antennas; others are parasitic antennas. The responses to the received signals are measured at the loaded terminals of the active element. The terminals of the parasitic element are shorted. The effect of the received signals on the parasites, i.e., the induced short-circuit current, is mutually coupled to the active elements. Eigen decomposition of the covariance matrix of the measurements of the APA array generates a third subspace in addition to the traditional signal and noise subspaces generated by the all-active ante
... Show MoreAbstract:
Rabi’a tribe lived on the land of Euphrates since the first century of the
Christ. Then that land becomes her homeland. The Persians tried many times
to drive her away from that land, but with out result.
In the course of time Rabi’a become more knowledgeable of Persia.
This tribe proved her love and sanctification to the land of Euphrates, in the
battle of Dhyqar.
Rabi’a converted to Islam quickly and helped the Muslims to conquer
Iraq with a big number of fighters in many battles like al- Qadisyyah. That
influenced the anger of Mudriat Arab tribes who were their old enemies.
Mudriat tribes did their efforts to reduce the importance of Rabi’a because of
some its branches were among of t
The research discusses with organizational spirituality and its implications on the organizational performance in the General Company for Food Industries in Abu Ghraib (Baghdad). The aim of the research was to determine the contribution of organizational spirituality in the organizational performance of the surveyed company. In order to achieve the objectives of the research، two main hypotheses were adopted. Several sub-hypotheses centered on the relationship between organizational spirituality and organizational performance in terms of its dimensions (Meaning work، self-esteem، community affiliation،
... Show MoreRecently, women's rape has been a pervasive problem in the Iraqi society. Thus, it has become necessary to consider the role of language and its influence on the common beliefs and opinions about rape in the Iraqi society. Thus, taking into consideration the critical role of language and its impact on the perception of human reality and the social development based on people's beliefs and principles of life has become highly indispensable. Therefore. The aim of this article is to address this problem critically from legislation and social norms in NGOs' reports (2015; 2019) with reference to some provisions from the Iraqi Panel Code (1969; 2010). Therefore, the researchers examine the discursive strategies and ideological viewpoints in t
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreAbstract:
The current research is aimed at analyzing the impact of the dimensions of Job involvement of all of (the enthusiasm, the Devotion, Assimilation ) in the Crystallize organizational Identification across the dimensions of (organizational loyalty, membership, similarities) and was named the Middle East, the Iraqi Investment Bank room to look as the research community of staff adopted in the bank, to be applied to a Random sample of (100) employees working in the said bank, and developed for the purposes of data collection, a questionnaire form included three axes covered (32) paragraph of the measure, which is included adopted Liekrt Quintet for the
... Show More