Results: The results summarized two goals, the first goal stipulates (to identify the degree of cyberbullying among academically outstanding students in the middle school stage). To achieve this goal, the researchers applied the research tool (electronic bullying scale) and then extracted the arithmetic mean for the sample of the current research, which amounted to (6.28) with a standard deviation of (4.03). Then the researchers applied the t-test for one sample to identify the significance of the differences between the means. The arithmetic mean for the sample and the hypothetical (theoretical) mean, which amounted to (11.5) degrees, and after applying the T-test for one sample, it was found that the calculated T-value, which amounted to
... Show MoreThis article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th
... Show MoreNowadays, 3D content is becoming an essential part of multimedia applications, when the 3D content is not protected, hackers may attack and steal it. This paper introduces a proposed scheme that provides high protection for 3D content by implementing multiple levels of security with preserving the original size using weight factor (w). First level of security is implemented by encrypting the texture map based on a 2D Logistic chaotic map. Second level is implemented by shuffling vertices (confusion) based on a 1D Tent chaotic map. Third level is implemented by modifying the vertices values (diffusion) based on a 3D Lorenz chaotic map. Results illustrate that the proposed scheme is completely deform the entire 3D content accord
... Show MoreThe Kurds' positions were characterized by insistence on their rights during the monarchy and choosing various solutions to obtain independence. After the revolution of July 14, 1958, the Kurds welcomed it, and the leaders of the Kurdistan Democratic Party sent a telegram to the Free Officers Organization congratulating them on the new era in order to build sound and correct relations between the two parties. However, the military conflict was renewed between the Iraqi government and the Kurds and continued even after the coup of February 8, 1963, and all the subsequent negotiating and peaceful attempts to resolve the Kurdish problem until 1966. It was a state of double contradiction for both parties that thwarted the peaceful attempts. The
... Show Moreعند الكتابة عن إمارة الحج في الدولة العربية الإسلامية لابد من التوقف عند المدة الزمنية للخليفة الرشيد لأهميتها في معرفة تطور الأحداث التاريخية وأبعادها، فمن خلال تتبع من تولى تلك الإمارة يمكن لنا استنتاج أمور عدة عن المنهج السياسي الذي كان يعتمده الخليفة الرشيد في إدارة الدولة.
الملخص : لا تخلو المصادر التاريخية من الإشارة إلى جذور معظم الظواهر الموجودة في الوقت الحاضر، وإن اختلفت التسمية من عصر إلى آخر، فمصطلح السكن العشوائي غير موجود في كتب التراث، ولكن الظاهرة موجودة وأشارت إليها المؤلفات التاريخية . Historical sources of study of the phenomenon of random housing Prof. Dr. Wijdan Fareeq Enad Revival of Arab Scientific Heritage Center Abstract The historical sources are not limited to reference to the roots of most of the phenomena that exist now, and that the name differed from one age to another. The term "random dwelli
... Show MoreAccording to grammarians In ( نإ) and Itha (اذإ) are conditionals and sometimes they may be used interchangeably. However, when they are mentioned in the Holy Qur’an, they have their own specific use. This paper attempts to investigate their meanings in the source language as well as investigate their translations and find out any differences or similarities. The translations that are adopted in this research are as follows: Pickthall, Al-Hilali & Khan, and Shakir.
هدف البحث إلى التعرف على اصالة الذات فضلاً عن التعرف على الفروق في اصالة الذات بين الطلبة على وفق متغير الجنس (ذكر – انثى) والتخصص الدراسي (علمي – انساني) والمرحلة الدراسية (أول- رابع)، تألفت عينة البحث من (140) طالبا وطالبة من طلبة جامعة الموصل-كلية التربية الاساسية، وتم تطبيق مقياس البحث - مقياس (اصالة الذات) وهو (من إعداد الباحثة)، وقد اسفرت نتائج البحث عن: - إن طلبة الجامعة يتمتعون بأصالة الذات. - عدم وجود فروق في
... Show MorePublic service motivation in public service organisations is one of the main problems that many developing countries have begun to experience, including Iraq. The public agenda is increasingly complex with reduced financial resources. In addition, these organisations have increased responsibilities with respect to the achievement of public goals and objectives as they are responsible for providing key services to members of the community (education, health and social work). This research is based on the degree of public service motivation among those working in health education and social work in public organisations, and aims to show the extent of the difference in the public service motivation of these employees according to di
... Show MorePauses as pragmatic markers are considered important devices that help readers to gain a better and deeper understanding of certain texts as well as speech, promoting effectively language communication. They can help both the speaker and the hearer, due to the functions they have in a text. Their occurrence in speech has a value that they make it more understandable. In this regard, the present study aims to examine the forms and functions of pauses in literary texts, more specifically, in selected extracts from two dramas, namely, Pinter's The Homecoming and Baker's Circle Mirror Transformation and to compare how the two writers use pauses in these two dramas. To do so, the sequential production approach of turn-taking by Sacks, Sc
... Show Moreالرّهاب، اضطراب نفسيّ واسع الانتشار، وتُشير الدّراسات الحديثة إلى أن نسبة انتشاره تتراوح ما بين (7%-14%) في أغلب المجتمعات، وهو اضطراب مُزمن ومُعطّل للحياة الاجتماعيّة، ولكنّه قابل للعلاج. ويتفق العلماء على أن عدم إدراك المعاق بصريًّا للبيئة المحيطة به، وأركانها يجعل تكّيفه معها محصورًا في إطارٍ ضيق، وبذلك تتبلور مشكلة البحث في الإجابة عن التساؤل الآتي: ما مستوى الرّهاب لدى التلامذة ضعاف البصر في المدارس الاب
... Show MoreAn essential element in English as a foreign language (EFL) learning is vocabulary. There is a big emphasis on learning the new words' meaning from the books or inside classrooms. Also, it is a major part of language teaching as well as being fundamental to the learner but there is a big challenge in vocabulary instruction due to the weak confidence by teachers in selecting the suitable practice in teaching vocabulary or they sometimes unable to specify a suitable time for it during the teaching process. The major aim of this study is to investigate the value of posters in vocabulary learning on the 2nd grade students at Halemat Alsaadia High School in Baghdad – Iraq. It hypothesized that there are no statistically significant differences
... Show MoreThe aims of visible watermarking are to prevent the illegal copying of videos and images and to avoid the theft and unauthorized advertisement of the legitimate owners' content. The visible watermark is distinguishable with the naked eye. This makes it easily removed by an attacker. This paper proposes an anti-removable visible logo by double embedding using the discrete wavelet transform (DWT) and a chaotic map. The main purpose of this method is to prevent the removal attack and restore the original video without information loss after the logo is legally removed. DWT is used for both the cover area and the logo to embed sub-bands of information from the cover area into sub-bands of the logo. The main idea of using a chaotic m
... Show MoreCognitive stylistics is one discipline of applied linguistics that relies on the reader’s interpretation and inference of the meaning of the text depending on his background knowledge. It studies how the reader understands the text and mapping it with his real experiences (Jeffries and McIntyre,2010). The present study is a cognitive stylistic analysis of digital stories. Digital stories are short narratives made by a combination of different sorts of digital media such as pictures, audios and videos. These digital media are employed to tell stories about oneself, famous people, and important events. The analyzed stories are selected from “Daily Yahoo Stories” and are analyzed according to Lakoff (1993) approach, The analysis investig
... Show MoreThis study is qualitative, it illustrates H.G. Wells\\'s The Time Machine through the scientific and social framework of the Victorian Era. Wells\\'s portrayal of future societies examines the rapid technological progress and social changes of the 19th century. The analysis scrutinizes the division between the Eloi and the Morlocks, tracing the consequences of social division. To meet the objective of the study, Victorian frame of mind is utilized to examine the class struggle that is symbolized by the Eloi and the Morlocks. The analysis highlights the economic and social effects of industrialization and how Wells examines the capitalist system and its impact on human relationships and class division. The study also utilizes concepts from D
... Show Moreاستهدف البحث الحالي تعرف أنماط الشخصية الإنيكرام السائدة ضمن مركز الغريزة لدى طلبة قسم التربية الخاصة، وكذلك تعرف أنماط الشخصية الإنيكرام السائدة ضمن مركز الغريزة لدى طلبة قسم التربية الخاصة وفقاً لمتغير النوع (ذكور، إناث)، ولتحقيق هذه الأهداف تم اعتماد الصورة المختصرة لمقياس أنماط الشخصية الإنيكرام المُعد من قبل (ريسو-هيودسن، 1995)، ترجمة (الياسري، 2004)، (تقنين: السلطاني، 2007)، وقد تم التحقق من الخصائص السيكومت
... Show MoreIn light of Chaos, the members of societies' general feeling of the system's importance often increases because they believe that they will lose all forms of security and safety if it does not exist. That is why they attribute such a high value to it, and the fear of the system's absence makes it inevitable for it to have continuity, for we live in a world full of surprises, rapid changes, confusion, and confusing
Illegal distribution of digital data is a common danger in the film industry, especially with the rapid spread of the Internet, where it is now possible to easily distribute pirated copies of digital video on a global scale. The Watermarking system inserts invisible signs to the video content without changing the content itself. The aim of this paper is to build an invisible video watermarking system with high imperceptibility. Firstly, the watermark is confused by using the Arnold transform and then dividing into equal, non-overlapping blocks. Each block is then embedded in a specific frame using the Discrete Wavelet Transform (DWT), where the HL band is used for this purpose. Regarding the method of selecting the host frames, the
... Show MoreThe current research aims to identify the degree to which a sample of managers in public organizations appreciated the level of application of the service leadership style from their point of view, and its relationship to the customer satisfaction index in light of the (Covid-19) pandemic, to achieve this, the researcher followed the experimental approach by applying a questionnaire that included two axes, The first: to measure the level of service leadership according to the scale (D. Van Dierendonck and I. Nuijten, 2011), which includes (8) dimensions (empowerment, stand back, accountability, courage, forgiveness, Authenticity, humility, stewardship). The second axis: to measure the level of customer satisfaction according to (Askim, 2004
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show Moreهدفت الدراسة التعرف على الضغوط النفسية والخوف من المستقبل لدى أمهات أطفال طيف التوحد، بلغت عينة الدراسة )60( ام لديهن طفل توحدي، تم استخدام المنهج الوصفي التحليلي وبعد تطبيق مقياسي الدراسة ومعالجة البيانات احصائيا توصلت الدراسة ان األمهات لديهن درجة عالية من الضغوط النفسية ودرجة عالية من الخوف حول مستقبل اطفالهن، وفي ضوء نتائج الدراسة خرجت الباحثة ببعض التوصيات والمقترحات.
<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt& pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi
... Show MoreThe culture of peace at the present time is considered one of the important issues locally and globally due to the large number of changes and transformations taking place in the external environment (globally - regionally - and locally) that have been reflected in various environmental, economic, social, cultural and technological fields and what accompanied it of changes in behavior, relationships, structural change and cultural change, since it has become necessary to present the ideal model for spreading the culture of peace in the areas of conflict that accompanied the war process, in addition to emphasizing the role of education in spreading the culture of peace, given that achieving prosperity, peace building, and ending violence dep
... Show MoreThe current research aims to prepare a proposed Programmebased sensory integration theory for remediating some developmental learning disabilities among children, researchers prepared a Programme based on sensory integration through reviewing studies related to the research topic that can be practicedby some active teaching strategies (cooperative learning, peer learning, Role-playing, and educational stories). The Finalformat consists of(39) training sessions.
يتناول البحث العلاقة بين الأسلوبية والنقد الأدبي والمقارنة بينهما بعد التعريف بهما وبالأدب. ويتناول أيضا موقف النقد الأدبي الحديث من الأسلوبية. ويميز بين نوعين من الأسلوبية: أسلوبية الأدب التي يتناولها النقد الأدبي، والأسلوبية الحديثة. وبيان الفروق بين النوعين. وسنرى في البحث أن الأسلوبية على الرغم من انتمائها الى اللغة والأدب والنقد والبلاغة، لكنها استطاعت أن تستقل بخصائص تجعلها علما مستقلا عن ا
... Show MoreThe aim of this study is to evaluate the implementation of ICT applications in public service organizations, which is responsible for the implementation of public policy. The study examined the success of ICT in achieving its goals by meeting the main needs of the community members which is the first requirement in the success of sustainable development plans before determine the capabilities of ICT. The main pillar of success in the implementation of ICT systems is the key to improving the efficiency of the organization's performance. This is a reflection of the effectiveness and quality of the services provided to its beneficiaries. The study concluded that the current level of capabilities of individuals working in public organizations i
... Show Moreهدف البحث الحالي قياس كشف الذات والأرتياح النفسي لدى طلبة الجامعة والموازنة بين الذكور والأناث في هذين المتغيرين فضلاً عن كشف العلاقة الإرتباطية بينهما، أستخدمت الباحثة المنهج الوصفي الإرتباطي بلغت عينة الدراسة (200) طالبًا وطالبة تم أختيارهم بالطريقة العشوائية الطبقية من مجتمع البحث من طلبة جامعة بغداد/ كلية الزراعة وكلية التربية الرياضية، أستخدمت الباحثة مقياسين أحدهما لكشف الذات والأخر للأرتياح النفسي (
... Show More