Preferred Language
Sort By
Filters
Filter
Publication
Publication Date
Indexed In
Publication Date
Tue Dec 15 2015
Journal Name
مجلة العلوم الاقتصادية والادارية
‫تحديد أثر أخلاقيات العلاقات العامة في القرارات الإستراتيجية دراسة وصفية تحليلية لآراء عينة من القيادات الإدارية في وزارة التعليم العالي والبحث العلمي
...Show More Authors

يختلف دور العلاقات العامة (PR) وأهميتها من مجتمع إلى آخر، تبعاً لاختلاف ثقافات هذه المجتمعات عموماً, ولاختلاف القيم الأخلاقية المعمول بها من ممارسيها في منظمات هذه المجتمعات, فالعلاقات العامة في المجتمعات المتقدمة وبعض الدول النامية قد خطت خطوات جبارة ووصلت إلى مرحلة المساهمة في التخطيط الاستراتيجي وعملية اتخاذ القرار, في إطار التزام إداراتها بقيم ومعايير أخلاقية محددة لممارسيها, وبالمقابل نجد أن تطبيقها في

... Show More
View Publication Preview PDF
Publication Date
Sun May 18 2014
Journal Name
مجلة المثنى للعلوم الإدارية والاقتصادية
ابداعية الادارة العامة بحث مداخل تحديث بيئة المنظمات العامة
...Show More Authors

يمثل الفهم الصحيح لادوار وأشكال الادارات العامة في سعيها لإنجاز الأهداف تلبية للاحتياجات المجتمعية عبر مؤسساتها العامة ، بعداً إستراتيجياً في الأداء الفعال والكفء لهذه الادارات ، وقد كان للتطورات الحاصلة في البيئة الخارجية دوراً مؤثرا أسهم في دفع العديد من الدول لإعادة النظر في أجهزتها الإدارية العامة لتحسين مقدرتها على مواجهة التغيرات المتسارعة والتوجه نحو اعتماد مداخل واستراتيجيات إبداعية حديثة في الع

... Show More
View Publication Preview PDF
Publication Date
Sun May 22 2022
Journal Name
Webology
Change and Strategic Planning for Quality in Universities: An Analytical Study
...Show More Authors

This research aims to analyse the problem of organizations in general and universities in particular, in dealing with �quality subjects� in a world where these organizations face the risks of becoming side lined and possibly vanished without looking for solutions that allow them to move in an open arena where change becomes the key to those solutions. Change here must be strategic and planning must adopts a way for organizations to develop mechanisms to manage change itself. Management leaders play a central role in achieving the principle required to chart new trends for universities in dealing with quality as a strategy that allows excellence and competition in light of the success of the processes of change. Change through reengineer

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 15 2021
Journal Name
المجلة العربية للبحوث الادبية والانسانسة
‬: COVID- القيادة الخدمية ورضا الزبون في ظل ازمة جائحة 19 تجريبي لقيادات المنظمات العامة في العراق بحث
...Show More Authors

يهدف البحث الحالي الى التعرف إلى درجة تقدير عينة من المديرين في المنظمات العامة لمستوى تطبيق ولتحقيق ، (Covid- نمط القيادة الخدمية من وجهة نظرهم ، وعلاقتها بمؤشر رضا الزبائن في ظل جائحة ( 19 ذلك اتبعت الباحثة المنهج التجريبي بتطبيق استبانة ضمت محورين، الأول: لقياس مستوى القيادة االخدمية وفقا الذي يشمل ( 8) أبعاد هي ( التمكين , الدعم , ( D. Van Dierendonck and I. Nuijten , لمقياس ( 2011 المساءلة, الشجاعة, التسامح , الموثوقية , التواضع , الر

... Show More
Publication Date
Sun Nov 15 2015
Journal Name
مجلة دراسات ادارية
‫بواعث الفساد وتقنيات مواجهته في المؤسسات العامة - العلاقة والأثر
...Show More Authors

كان الفساد وما زال أحد المواضيع الرئيسة التي شغلت اهتمام الباحثين والدارسين في المجالات المعرفية المختلفة بضمنها المجال الإداري نظراً للتأثير السلبي والمباشر لإدارات المؤسسات الحكومية العامة على نجاح برامج وخطط التنمية في تحقيق أهدافها المجتمعية, إذ أن عملية تنفيذ هذه البرامج تقع على عاتق إدارات هذه المؤسسات في إطار التزام العاملين فيها بتحقيق الأهداف والسياسات التنموية العامة للدولة ، وحرصهم على تلبية ا

... Show More
Publication Date
Wed Sep 13 2023
Journal Name
مجلة العلوم النفسية
واقع مشاركة رياديات الاعمال في تحقيق اهداف التنمية المستدامة دراسة ميدانية في محافظة بغداد
...Show More Authors

للمرأة دوراً استراتيجياً حيوياً في المجتمع ، بوصفها نصف المجتمع ، ونظراً لأهمية الأدوار التي تؤديها في مجالات الحياة كافه سواء الاجتماعية ، أو السياسية ، أو الاقتصادية ، في ظل التغيرات والتحولات التي شهدتها المجتمعات عامة والمجتمع العراقي تحديدا, لاسيما في الفترة الأخيرة كانتشار التعليم والصحة ومفاهيم العدالة وتكافؤ الفرص في مختلف الميادين ، والتي صاحبها وبشكل واضح زيادة مشاركة المرأة في مجالات العمل المخ

... Show More
Publication Date
Fri Jun 30 2023
Journal Name
مجلة نسق
ثقافة السلام ديناميكية التغيير لتنمية مستدامة
...Show More Authors

The culture of peace at the present time is considered one of the important issues locally and globally due to the large number of changes and transformations taking place in the external environment (globally - regionally - and locally) that have been reflected in various environmental, economic, social, cultural and technological fields and what accompanied it of changes in behavior, relationships, structural change and cultural change, since it has become necessary to present the ideal model for spreading the culture of peace in the areas of conflict that accompanied the war process, in addition to emphasizing the role of education in spreading the culture of peace, given that achieving prosperity, peace building, and ending violence dep

... Show More
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
Blindness and the Critique of Society: Dystopia in “Blindness” by José Saramago""
...Show More Authors

This paper addresses the new coloring in the concept of dystopian society as represented by the positive role of one of the characters vs. the passive role of the government and its mutual effect on the people of the society. In addition, it describes how all men in the dystopian society victimize and degrade the other through unlawful acts, like: stealing, rape, and fear, which are the lowest points in a moral decay. However, it offers hope by illustrating a positive sense, as exemplified by the doctor's wife out of Saramago's optimistic view that men may be descended from good women. Accordingly, the paper aims to examine the effect of the government’s role in the lives of the people who have later turned into blind in a dystopi

... Show More
Crossref
Publication Date
Wed Apr 26 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Video Copyright Protection
...Show More Authors

Illegal distribution of digital data is a common danger in the film industry, especially with the rapid spread of the Internet, where it is now possible to easily distribute pirated copies of digital video on a global scale. The Watermarking system inserts invisible signs to the video content without changing the content itself. The aim of this paper is to build an invisible video watermarking system with high imperceptibility. Firstly, the watermark is confused by using the Arnold transform and then dividing into equal, non-overlapping blocks. Each block is then embedded in a specific frame using the Discrete Wavelet Transform (DWT), where the HL band is used for this purpose. Regarding the method of selecting the host frames, the

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jul 05 2023
Journal Name
Journal Of Pragmatics Research
Analysis of Impoliteness Strategies Used in Putin's Speech at Annexation Ceremony
...Show More Authors

This study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
3D Content Encryption Using Multi-Level Chaotic Maps
...Show More Authors

      Nowadays, 3D content is becoming an essential part of multimedia applications, when the 3D content is not protected, hackers may attack and steal it. This paper introduces a proposed scheme that provides high protection for 3D content by implementing multiple levels of security with preserving the original size using weight factor (w). First level of security is implemented by encrypting the texture map based on a 2D Logistic chaotic map. Second level is implemented by shuffling vertices (confusion) based on a 1D Tent chaotic map. Third level is implemented by modifying the vertices values (diffusion) based on a 3D Lorenz chaotic map. Results illustrate that the proposed scheme is completely deform the entire 3D content accord

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 29 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Optimization Techniques for Human Multi-Biometric Recognition System
...Show More Authors

Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa

... Show More
View Publication
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Real time handwriting recognition system using CNN algorithms
...Show More Authors

Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition

... Show More
View Publication
Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.        Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o

... Show More
Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Thu Mar 15 2018
Journal Name
Arab World English Journal
Pedagogical Stylistics as a Tool in the Classroom: An Investigation of EFL Undergraduate Students' Ability in Analyzing Poetic Language
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Data Hiding in 3D Model Based on Surface Properties
...Show More Authors

    Data hiding strategies have recently gained popularity in different fields; Digital watermark technology was developed for hiding copyright information in the image visually or invisibly. Today, 3D model technology has the potential to alter the field because it allows for the production of sophisticated structures and forms that were previously impossible to achieve. In this paper, a new watermarking method for the 3D model is presented. The proposed method is based on the geometrical and topology properties of the 3D model surface to increase the security. The geometrical properties are based on computing the mean curvature for a surface and topology based on the number of edges around each vertex, the vertices

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Survey on 3D Content Encryption
...Show More Authors

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Combining Arabic Nested Noun Compound and Collocation Extraction Using Linguistic and Statistical Approach
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Thu Aug 03 2023
Journal Name
Cogent Arts &humanities
An Ecostylistic Analysis of Selected Extracts from Michael Punke’s Novel The Revenant
...Show More Authors

.

View Publication
Scopus (1)
Scopus
Publication Date
Thu Mar 24 2022
Journal Name
Arab World English Journal
Collocation Networks of Selected Words in Academic Writing: A Corpus-Based Study
...Show More Authors

This study aims at shedding light on the linguistic significance of collocation networks in the academic writing context. Following Firth’s principle “You shall know a word by the company it keeps.” The study intends to examine three selected nodes (i.e. research, study, and paper) shared collocations in an academic context. This is achieved by using the corpus linguistic tool; GraphColl in #LancsBox software version 5 which was announced in June 2020 in analyzing selected nodes. The study focuses on academic writing of two corpora which were designed and collected especially to serve the purpose of the study. The corpora consist of a collection of abstracts extracted from two different academic journals that publish for writ

... Show More
View Publication
Clarivate Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Webology
Ethical Perception of Leadership and Responsible Behavior: An Exploratory Study of Leaders of Public Organizations in Iraq
...Show More Authors

The study aimed to identify the effect of the ethical perception of a sample of managers in public organizations on responsible behavior in light of the rapid changes taking place in the external environment. To achieve this, the researcher followed the descriptive analytical approach by applying a questionnaire of two parts. The first part dealt with the ethical perception according to the scale of Johnson (2015), which consisted of (22) items. The second part dealt with measuring responsible behavior, which consisted of (20) items based on the scale of Development of Ethical Behavior (Narvaez, 2006) for a sample of (125) respondents randomly chosen. The results showed that the estimation degree of managers in public governmental o

... Show More
View Publication
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
EFL Student- Teachers' Perception in the Culture of Thinking
...Show More Authors

Many studies have recommended implying the skills and strategies of creative thinking, critical thinking, and reflective thinking in EFLT curriculum to overcome EFL teaching-learning process difficulties. It is really necessary to make EFL teachers aware of the importance of cultural thinking and have a high perception of its forces. Culture of thinking consists of eight cultural forces in every learning situation; it helps to shape the group's cultural dynamic. These forces are expectations, language, time, modeling, opportunities, routines, interactions, and environment. This study aims to investigate EFL student-teachers’ perceptions of cultural thinking. The participants are selected randomly from the fourth-stage students at

... Show More
Preview PDF
Crossref
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Image Denoising Using Multiwavelet Transform with Different Filters and Rules
...Show More Authors

<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt&amp; pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Education College Wasit University
Postmodernism and Technology in Don Delillo's Novel The White Noise
...Show More Authors

This paper aims at investigating the effect of postmodernism and technology on the social life in Don Delillo's novel The White Noise. In this novel, Don Delillo portrays the chaotic life by using modern technology which has been presented by three ways. The first way is by television as being a source of information and entertainment. The second way is by the toxic event whereas the third is by Dylar's episode and its destructive consequences. He depicts that through the atmosphere of Jack's family plus its effects on the life and thoughts of the elders and society. He proves that technology is leading humanity not to safety, but to death. He further highlights that by showing the impact of technology on the life of the main charac

... Show More
View Publication
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
العلوم النفسية
( التفكك الاسري لدى تلامذة الصف السادس الابتدائي في ضوء بعض المتغيرات)
...Show More Authors

الملخص: لتحقيق أهداف البحث قامت الباحثتان ببناء مقياس للتفكك الاسري اعتمادا على نظرية (باندورا) وتكون بصورته النهائية من (24) فقرة ، وطبق المقياس على عينة البحث البالغة (150) تلميذ وتلميذة تم اختيارهم بالطريقة العشوائية البسيطة من مجتمع البحث ،وبعد جمع البيانات تم معالجتها باستعمال الوسائل الإحصائية منها الاختبار التائي، وتحليل التباين الرباعي والاختبار الفائي، وتوصل البحث الى النتائج الأتية :ان أفراد عينة ال

... Show More
Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
مجلة بحوث كلية التربية الاساسية
Essence - Appearance and it’s Relation with Self -efficacy and Scholastic Achievement for Preparatory School Students
...Show More Authors

الذات والتحصيل الدراسي . وقد استخدمت الباحثة المنهج الوصفي التحليلي، وبلغت عينة الدراسة (500) طالبًا وطالبة، تم اختيارهم بالطريقة الطبقية العشوائية وهي تمثل (15%) من مجتمع الدراسة البالغ (3328) طالباً وطالبة من طلبة المرحلة الإعدادية واستخدمت الباحثة مقياسين تم بناء مقياس لقياس الجوهر والمظهر وتبني مقياس فاعلية الذات بعد إن قامت بترجمته وتعريبه وجعله ملائم للبيئة العراقية، كم تم استخراج درجات التحصيل الدراسي للع

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 15 2021
Journal Name
Arab World English Journal For Translation And Literary Studies
Insanity and Murder in Robert Browning’ and Robert Lowell’s Dramatic Monologues
...Show More Authors

The study aims at fathoming Robert Browning’ and Robert Lowell’s intentions of choosing the dramatic monologue as a means of exploring human psyche. Significantly, the themes of insanity and murder are not ideal from an esthetic perspective, but for Browning and Lowell it provides the key to probe into human character and fundamental motives. This study examines Browning’ and Lowell’s dramatic monologues that address crime and the psyche of abnormal men. Browning’ and Lowell’s poetry in this regard unravels complicated human motivations and delineates morbid psychologies. Their monologues probe deep down into the mind-sets of their characters and dissect their souls to the readers. The main character of each of Browning

... Show More
View Publication
Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Image Watermarking using Integer Wavelet Transform and Discrete Cosine Transform
...Show More Authors

In the current research work, a system of hiding a text in a digital grayscale image has been presented. The algorithm system that had been used was adopted two transforms Integer Wavelet transform and Discrete Cosine transformed. Huffman's code has been used to encoding the text before the embedding it in the cover image in the HL sub band. Peak Signal to Noise Ratio (PSNR) was used to measure the effect of embedding text in the watermarked image; also correlation coefficient has been used to measure the ratio of the recovered text after applying an attack on the watermarked image and we get a good result. The implementation of our proposed Algorithm is realized using MATLAB version 2010a.

View Publication Preview PDF