ريل لسادة الكيسياء َ جؼ البحث الى التعخؼ عمى أثخ استخاتيجية فجػة السعمػمات في التح َى جؼ البحث فقج صيغت الفخضية التي َ تػسط , والتحقق مغ ى ُ جى شلاب الرف الثاني الس َ ل جؼ البحث أعتسج الباحث َ تتعمق بالتحريل ولتحقيق ى ػعتيغ متداويتيغ ُ بي لسجس ِ ي السشيج التجخ ريل الجراسي , تكػنت عيشة البحث مغ َ ) شالب مغ شلاب ٗٛ( ذواتي اختبار بعجي لمتح -ٕٕٕٓالرف الثاني الستػسط في ( متػسصة الذييج خزيخ جاسع العارضي ) لمعاـ الجارسي ( ا ٕٗ) حيث بمغ عجد شلاب السجسػعة التجخيِبية (ٕٕٖٓ َ ) شالب , ٕٗ ) شالب و الزبصة ( ت السجسػعتاف في بعس الستغيخات ( العسخ الدمشي بالذيػر , التحريل الجراسي لمػالجيغ َ وكػفئ , اختبار الحكاء , اختبار السعمػمات الدابقة لسادة الكيسياء ) , تع اعجاد اختبار تحريمي لسادة فقخة مػضػعية مغ نػع الاختيار مغ متعجد , وتع (40)الكيسياء وتألف اختبار التحريل مغ جسػعة الزابصة َ ت الس ُ فق استخاتيجية فجػة السعمػمات ودرس ُ جسػعة التجخيبية عمى و َ تجريذ الس جسػعتي البحث ُ تبار التحريل عمى كلا م ُ نتياء التجخبة شبق اخ ِ تيادية وعشج ا َ خيقة اع َ وفق الص . ابصة َ يبية والز ِ التجخ وقج أضيخت الشتائج ػد فخؽ ُ : الى وج ُ ذ ج مدتػى دلالة َ و دلالة احرائية عش (0.05) جػة َ يجية ف ِ ات ػا عمى وفق استخ ُ بية الحيغ درس ِ ي جسػعة التجخ ُ تػسط درجات شلاب الس َ غ م ِ بي جات شلاب السجسػعة الزابصة الحي درسػا عمى وفق الصخيقة َ السعمػمات وبيغ متػسط در الاعتيادية في الاختبار التحريمي لرالح السجسػعة التجخيبية
An idiom is a group of words whose meaning put together is different from the meaning of
individual words. English is a rich language when it comes to idioms, they represent variety. For
foreign learners, idioms are problematic because even if they know the meaning of individual
words that compose an idiom the meaning of it might be something completely different.
The present study investigates Iraqi third year college students’ recognition of idioms. To
achieve this, the researchers have conducted a test which comprises three questions. Certain
conclusions are reached here along with some suggestions and recommendations.
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreE-commerce is the most important result of information technology in this day and age, has resulted in the use of commercial transactions to changes in economic, social, and psychological, and produced a new type of shopping, jobs, and create new job opportunities, and changed the traditional work environment. The challenge currently facing economic units is how to transfer this technology and its integration within the community, especially after the massive developments that have occurred in the areas of commercial and congested markets units, the economic and the products and services the many and varied and intensified competition among these units to achieve a profit, leading to the emergence of e-commerce as on
... Show Moreيكتسب موضوع تدريب وتطوير العاملين أهمية بالغة في الظروف الاقتصادية الحالية التي تسودها مفاهيم وتوجهات جديدة كعولمة الاقتصاد ورأس المال المعرفي والفكري، وحيث صارت المعارف والمهارات والقابليات التي يمتلكها العاملون محركاً أساسياً باتجاه النجاح، وعنصراً مهماً في زيادة فاعلية منشأة الأعمال، وإدامة وجودها واستمرارها.
إن العاملين المدربين بشكل جيد على عمليات المنشأة وطبيعة المواد التي تستخدمها وإنتاجه
... Show MoreResearchers often equate database accounting models in general and the Resources-Events-Agents (REA) accounting model in particular with events accounting as proposed by Sorter (1969). In fact, REA accounting, database accounting, and events accounting are very different. Because REA accounting has become a popular topic in AIS research, it is important to agree on exactly what is meant by certain ideas, both in concept and in historical origin. This article clarifies the analyzing framework of REA accounting model and highlights the differences between the terms events accounting, database accounting, semantically-modeled accounting, and REA accounting. It als
... Show MoreThe aim of this research was to analyze the financial reporting requirements of segmental information that stipulated by the Iraqi accounting rules, investigating the extent of it compliance with the requirements of the International Financial Reporting Standard No.8 (IFRS 8) and the Statement of Financial Standards No.131 (SFAS 131). Also the research aimed to identify the segmental disclosure practices in listed corporations on Iraq Stock Exchange (ISX), basing on a hypotheses said that “the insufficient of Iraqi financial reporting requirements of segmental information affect<
... Show MoreIt has aimed by this research at presenting new interpretations to diversification phenomenon and its possible effects on firm value. These interpretations are culminated by the disclosure of the distinct role of resource-based view in the study of relationship between diversification strategy and firm value. The study has conducted on a sample consisted of the largest American companies listed in Fortune 500 along with seven years period
(2005-2011). This first local attempt, which has based on panel dat--a analysis for interpreting an expected variance of firm value due to diversification strategy, may helps with a clear vision to solve the contradiction and confusion surrounded the true linkages between t