The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process in primary schools with modern technologies and multimedia related to science subjects for the fifth grade was implemented, with the aim of trying to change the method and style of teaching to be from indoctrination to understanding, the researcher obtained important positive results after applying this experiment that The importance of shifting to a new method that adopts a combination of investment in the use of modern technologies represented in multimedia with the traditional teaching process has proven the effect of this apparent the combination in raising the cognitive abilities of students. The researcher also concluded by basing cognitive abilities on three main pillars: (teacher, means Educational, educational techniques) and that the absence of any of them will lead to a defect in the student's cognitive ability,The most important research proposals were to urge the Ministry of Education to provide schools with advanced electronic devices and means, such as devices, computers and its accessories such as CDs, printers, multimedia reading and display devices, and others, which help to provide the student with a more understanding of the materials being taught.
The purpose of the study is to analyze the extent of the impact of liquidity as an independent variable on profitability as an intermediate variable and the value of banks listed in the Iraq Stock Exchange as a dependent variable, as the research problem is summarized by the fact that most banks focus on profitability as a phased goal without focusing on maximizing its value as a strategic goal by enhancing the wealth of owners and shareholders. On the long term, the research community is represented by the banks listed on the Iraq Stock Exchange, while the research sample was deliberately chosen, which included three private banks such as Baghdad Commercial Bank, the Iraqi Commercial Bank and the Iraqi Investment Bank, an
... Show More|
Woman is the first target of social advertising, because most of these advertisements are primarily belong to them. This paper which is entitled "Social Responsibility for the Employment of Woman in Sustainable Development Declarations, An Analytical Study of Road Advertising in Baghdad" focuses on the use of woman in advertising. This aspect shows that some people see that advertisement is a mirror to what’s found in society such as woman’s behaviors in her everyday life and so on, while other people see that as long as the public wants those advertisings, they are free to choose what they prefer. They think that the shameful advertisements are natural and unavoidable. These vie |
The objective of this study is to measure the impact of financial development on economic growth in Iraq over the period (2004-2018) by applying a fully corrected square model (FMOLS) Whereas, a set of variables represented by (credit-to-private ratio of GDP, the ratio of money supply in the broad sense of GDP, percentage of bank deposits from GDP) were chosen as indicators for measuring financial development and GDP to measure economic growth.
Major tests have been carried out, such as the stability test (Unite Root Test), the integration test (Cointegration). Results of the study showed that there
... Show MoreThis paper deals with the subject of demarcating as appropriate scientific techniques to rationalize consumption and to control segments of the society for the technical conduct of its handling of the product depending on the mix of elements (product and the volume of demand, Price, promotion and distribution), but inverse manner designed to adjust the working condition of balance between supply and demand and to ensure that rates continue in the marketing process properly, and therefore the research aims to shed light on some of the practices that reflect the Demarketing techniques, As well as the statement of the reality of attitudes towards the practice of those techniques through a sample survey of officials in Baghdad company for so
... Show MoreThe main goal of this in vivo study was to evaluate the effect of 532nm Q-switched Nd: YAG Laser in combination with Human Serum Albumin 20% concentration (as a welding aid) on the liver tissue repair clinically, and histologically. The animals used in this study were 21 male rabbits divided into three main groups: control group (3 rabbits), conventionally treated group (9 rabbits) and Laser treated group (9 rabbits). Each two main groups (conventional and laser treated) consist of three sub-groups depending on the response evaluation at three different periods. The Laser group was treated using 532nm Q-switched Nd: YAG laser after adding human serum albumin immediately on the incised liver’s tissue. The energy of was 460mJ, and 4Hz fr
... Show MoreAuthentic materials are the most important tools that the teacher could use in class in order to make teaching go smoothly and effectively in transmitting the necessary knowledge to all students. This research has investigated experimentally the effect of using authentic materials in teaching English as a foreign Language, because a number of studies point out that the use of authentic materials is regarded a useful means to motivate learners, arouse their interest and expose them to the real language they will face in real life situations.
It is hypothesis that there is no statistical significance difference between the experimental group who taught English as a foreign language by using the authentic materials with those
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show More