يختلف دور العلاقات العامة (PR) وأهميتها من مجتمع إلى آخر، تبعاً لاختلاف ثقافات هذه المجتمعات عموماً, ولاختلاف القيم الأخلاقية المعمول بها من ممارسيها في منظمات هذه المجتمعات, فالعلاقات العامة في المجتمعات المتقدمة وبعض الدول النامية قد خطت خطوات جبارة ووصلت إلى مرحلة المساهمة في التخطيط الاستراتيجي وعملية اتخاذ القرار, في إطار التزام إداراتها بقيم ومعايير أخلاقية محددة لممارسيها, وبالمقابل نجد أن تطبيقها في
... Show Moreيمثل الفهم الصحيح لادوار وأشكال الادارات العامة في سعيها لإنجاز الأهداف تلبية للاحتياجات المجتمعية عبر مؤسساتها العامة ، بعداً إستراتيجياً في الأداء الفعال والكفء لهذه الادارات ، وقد كان للتطورات الحاصلة في البيئة الخارجية دوراً مؤثرا أسهم في دفع العديد من الدول لإعادة النظر في أجهزتها الإدارية العامة لتحسين مقدرتها على مواجهة التغيرات المتسارعة والتوجه نحو اعتماد مداخل واستراتيجيات إبداعية حديثة في الع
... Show MoreThis research aims to analyse the problem of organizations in general and universities in particular, in dealing with �quality subjects� in a world where these organizations face the risks of becoming side lined and possibly vanished without looking for solutions that allow them to move in an open arena where change becomes the key to those solutions. Change here must be strategic and planning must adopts a way for organizations to develop mechanisms to manage change itself. Management leaders play a central role in achieving the principle required to chart new trends for universities in dealing with quality as a strategy that allows excellence and competition in light of the success of the processes of change. Change through reengineer
... Show Moreيهدف البحث الحالي الى التعرف إلى درجة تقدير عينة من المديرين في المنظمات العامة لمستوى تطبيق ولتحقيق ، (Covid- نمط القيادة الخدمية من وجهة نظرهم ، وعلاقتها بمؤشر رضا الزبائن في ظل جائحة ( 19 ذلك اتبعت الباحثة المنهج التجريبي بتطبيق استبانة ضمت محورين، الأول: لقياس مستوى القيادة االخدمية وفقا الذي يشمل ( 8) أبعاد هي ( التمكين , الدعم , ( D. Van Dierendonck and I. Nuijten , لمقياس ( 2011 المساءلة, الشجاعة, التسامح , الموثوقية , التواضع , الر
... Show Moreكان الفساد وما زال أحد المواضيع الرئيسة التي شغلت اهتمام الباحثين والدارسين في المجالات المعرفية المختلفة بضمنها المجال الإداري نظراً للتأثير السلبي والمباشر لإدارات المؤسسات الحكومية العامة على نجاح برامج وخطط التنمية في تحقيق أهدافها المجتمعية, إذ أن عملية تنفيذ هذه البرامج تقع على عاتق إدارات هذه المؤسسات في إطار التزام العاملين فيها بتحقيق الأهداف والسياسات التنموية العامة للدولة ، وحرصهم على تلبية ا
... Show Moreللمرأة دوراً استراتيجياً حيوياً في المجتمع ، بوصفها نصف المجتمع ، ونظراً لأهمية الأدوار التي تؤديها في مجالات الحياة كافه سواء الاجتماعية ، أو السياسية ، أو الاقتصادية ، في ظل التغيرات والتحولات التي شهدتها المجتمعات عامة والمجتمع العراقي تحديدا, لاسيما في الفترة الأخيرة كانتشار التعليم والصحة ومفاهيم العدالة وتكافؤ الفرص في مختلف الميادين ، والتي صاحبها وبشكل واضح زيادة مشاركة المرأة في مجالات العمل المخ
... Show MoreThe culture of peace at the present time is considered one of the important issues locally and globally due to the large number of changes and transformations taking place in the external environment (globally - regionally - and locally) that have been reflected in various environmental, economic, social, cultural and technological fields and what accompanied it of changes in behavior, relationships, structural change and cultural change, since it has become necessary to present the ideal model for spreading the culture of peace in the areas of conflict that accompanied the war process, in addition to emphasizing the role of education in spreading the culture of peace, given that achieving prosperity, peace building, and ending violence dep
... Show MoreThis paper addresses the new coloring in the concept of dystopian society as represented by the positive role of one of the characters vs. the passive role of the government and its mutual effect on the people of the society. In addition, it describes how all men in the dystopian society victimize and degrade the other through unlawful acts, like: stealing, rape, and fear, which are the lowest points in a moral decay. However, it offers hope by illustrating a positive sense, as exemplified by the doctor's wife out of Saramago's optimistic view that men may be descended from good women. Accordingly, the paper aims to examine the effect of the government’s role in the lives of the people who have later turned into blind in a dystopi
... Show MoreIllegal distribution of digital data is a common danger in the film industry, especially with the rapid spread of the Internet, where it is now possible to easily distribute pirated copies of digital video on a global scale. The Watermarking system inserts invisible signs to the video content without changing the content itself. The aim of this paper is to build an invisible video watermarking system with high imperceptibility. Firstly, the watermark is confused by using the Arnold transform and then dividing into equal, non-overlapping blocks. Each block is then embedded in a specific frame using the Discrete Wavelet Transform (DWT), where the HL band is used for this purpose. Regarding the method of selecting the host frames, the
... Show MoreThis study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most
... Show MoreNowadays, 3D content is becoming an essential part of multimedia applications, when the 3D content is not protected, hackers may attack and steal it. This paper introduces a proposed scheme that provides high protection for 3D content by implementing multiple levels of security with preserving the original size using weight factor (w). First level of security is implemented by encrypting the texture map based on a 2D Logistic chaotic map. Second level is implemented by shuffling vertices (confusion) based on a 1D Tent chaotic map. Third level is implemented by modifying the vertices values (diffusion) based on a 3D Lorenz chaotic map. Results illustrate that the proposed scheme is completely deform the entire 3D content accord
... Show MoreResearchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa
... Show MoreAbstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreInformation hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Data hiding strategies have recently gained popularity in different fields; Digital watermark technology was developed for hiding copyright information in the image visually or invisibly. Today, 3D model technology has the potential to alter the field because it allows for the production of sophisticated structures and forms that were previously impossible to achieve. In this paper, a new watermarking method for the 3D model is presented. The proposed method is based on the geometrical and topology properties of the 3D model surface to increase the security. The geometrical properties are based on computing the mean curvature for a surface and topology based on the number of edges around each vertex, the vertices
... Show More<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t
... Show MoreThis study aims at shedding light on the linguistic significance of collocation networks in the academic writing context. Following Firth’s principle “You shall know a word by the company it keeps.” The study intends to examine three selected nodes (i.e. research, study, and paper) shared collocations in an academic context. This is achieved by using the corpus linguistic tool; GraphColl in #LancsBox software version 5 which was announced in June 2020 in analyzing selected nodes. The study focuses on academic writing of two corpora which were designed and collected especially to serve the purpose of the study. The corpora consist of a collection of abstracts extracted from two different academic journals that publish for writ
... Show MoreThe study aimed to identify the effect of the ethical perception of a sample of managers in public organizations on responsible behavior in light of the rapid changes taking place in the external environment. To achieve this, the researcher followed the descriptive analytical approach by applying a questionnaire of two parts. The first part dealt with the ethical perception according to the scale of Johnson (2015), which consisted of (22) items. The second part dealt with measuring responsible behavior, which consisted of (20) items based on the scale of Development of Ethical Behavior (Narvaez, 2006) for a sample of (125) respondents randomly chosen. The results showed that the estimation degree of managers in public governmental o
... Show MoreMany studies have recommended implying the skills and strategies of creative thinking, critical thinking, and reflective thinking in EFLT curriculum to overcome EFL teaching-learning process difficulties. It is really necessary to make EFL teachers aware of the importance of cultural thinking and have a high perception of its forces. Culture of thinking consists of eight cultural forces in every learning situation; it helps to shape the group's cultural dynamic. These forces are expectations, language, time, modeling, opportunities, routines, interactions, and environment. This study aims to investigate EFL student-teachers’ perceptions of cultural thinking. The participants are selected randomly from the fourth-stage students at
... Show More<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt& pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi
... Show MoreThis paper aims at investigating the effect of postmodernism and technology on the social life in Don Delillo's novel The White Noise. In this novel, Don Delillo portrays the chaotic life by using modern technology which has been presented by three ways. The first way is by television as being a source of information and entertainment. The second way is by the toxic event whereas the third is by Dylar's episode and its destructive consequences. He depicts that through the atmosphere of Jack's family plus its effects on the life and thoughts of the elders and society. He proves that technology is leading humanity not to safety, but to death. He further highlights that by showing the impact of technology on the life of the main charac
... Show Moreالملخص: لتحقيق أهداف البحث قامت الباحثتان ببناء مقياس للتفكك الاسري اعتمادا على نظرية (باندورا) وتكون بصورته النهائية من (24) فقرة ، وطبق المقياس على عينة البحث البالغة (150) تلميذ وتلميذة تم اختيارهم بالطريقة العشوائية البسيطة من مجتمع البحث ،وبعد جمع البيانات تم معالجتها باستعمال الوسائل الإحصائية منها الاختبار التائي، وتحليل التباين الرباعي والاختبار الفائي، وتوصل البحث الى النتائج الأتية :ان أفراد عينة ال
... Show Moreالذات والتحصيل الدراسي . وقد استخدمت الباحثة المنهج الوصفي التحليلي، وبلغت عينة الدراسة (500) طالبًا وطالبة، تم اختيارهم بالطريقة الطبقية العشوائية وهي تمثل (15%) من مجتمع الدراسة البالغ (3328) طالباً وطالبة من طلبة المرحلة الإعدادية واستخدمت الباحثة مقياسين تم بناء مقياس لقياس الجوهر والمظهر وتبني مقياس فاعلية الذات بعد إن قامت بترجمته وتعريبه وجعله ملائم للبيئة العراقية، كم تم استخراج درجات التحصيل الدراسي للع
... Show MoreThe study aims at fathoming Robert Browning’ and Robert Lowell’s intentions of choosing the dramatic monologue as a means of exploring human psyche. Significantly, the themes of insanity and murder are not ideal from an esthetic perspective, but for Browning and Lowell it provides the key to probe into human character and fundamental motives. This study examines Browning’ and Lowell’s dramatic monologues that address crime and the psyche of abnormal men. Browning’ and Lowell’s poetry in this regard unravels complicated human motivations and delineates morbid psychologies. Their monologues probe deep down into the mind-sets of their characters and dissect their souls to the readers. The main character of each of Browning
... Show MoreIn the current research work, a system of hiding a text in a digital grayscale image has been presented. The algorithm system that had been used was adopted two transforms Integer Wavelet transform and Discrete Cosine transformed. Huffman's code has been used to encoding the text before the embedding it in the cover image in the HL sub band. Peak Signal to Noise Ratio (PSNR) was used to measure the effect of embedding text in the watermarked image; also correlation coefficient has been used to measure the ratio of the recovered text after applying an attack on the watermarked image and we get a good result. The implementation of our proposed Algorithm is realized using MATLAB version 2010a.