This research delves into the role of satirical television programs in shaping the image of Iraqi politicians. The research problem is summarized in the main question: How does satire featured in television programs influence the portrayal of Iraqi politicians? This research adopts a descriptive approach and employs a survey methodology. The primary data collection tool is a questionnaire, complemented by observation and measurement techniques. The study draws upon the framework of cultural cultivation theory as a guiding theoretical foundation. A total of 430 questionnaires were disseminated among respondents who regularly watch satirical programs, selected through a multi-stage random sampling procedure.
Th
Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreAbstract:
The distribution or retention of profits is the third decision among financial management decisions in terms of priority, whether at the level of theory or practice, as the issue of distribution or retention is multi-party in terms of influence and impact, as determining the optimal percentage for each component is still the subject of intellectual debate because these decisions are linked to the future of the organization and several considerations, The research focus on the nature of the policies followed by the Iraqi banking sector As the sample chosen by the intentional sampling method was represented by the Commercial Bank of
... Show MoreThe study aimed to monitor the concept of reputation in the previous literature, its relationship to mental image and identity, and to reveal recent trends in its measurement Techniques.
The study relied on a descriptive approach using library survey and comparative analysis, and the study reached following conclusions:
Despite the beginning of the first signs of reputation In the fifties of the last century, however, Defining and standardizing the concept with clear and specific dimensions began in the 1990s and the beginning of the third millennium. The concept of reputation refers to the stakeholders’ overall evaluation of organizations, which reflects their perceptions of
... Show MoreWA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.
لقد انبثقت رؤيا حديثة في مسرح الثمانينات من القرن العشرين كان هدفها دحر حس الاسر الذي عاشه انسان العصر الحديث وفي محاولة للارتقاء بارادته وحرية الاختيار نحو الانعتاق من محاولات المصادرة الفظة لها. وبالرغم من افتراض هذه الرؤيا انها ذات طابع سلبي, الا ان رؤيا الانتحار قدعدت بانها قادرة على ان تجعل في متناول يد الانسان احساسا طموحا بالتحكم على الاقل بنوع النهاية التي يكتبها لحياته. وقد انعكست هذة الرؤيا ال
... Show MoreThe study problem is about the role of Shaqra University in building the mental image of the Kingdom’s 2030 vision among its female students. The study aims to examine the university’s role in providing information about the Kingdom’s 2030 vision, its role in shaping the vision’s image, the university’s role in the behavioral aspect of the vision, along with studying the extent of differences in answers of the sample individuals towards the study themes attributed to the personal variables. The researcher adopted the descriptive survey method. A sample of (1399) female students was used to achieve the study objectives. The results showed that university’s role in building the mental image of the Kingdom’s 2030 vision, among
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreThe vegetable cover plays an important role in the environment and Earth resource sciences. In south Iraq, the region is classified as arid or semiarid area due to the low precipitations and high temperature among the year. In this paper, the Landat-8 satellite imagery will be used to study and estimate the vegetable area in south Iraq. For this purpose many vegetation indices will be examined to estimate and extract the area of vegetation contain in and image. Also, the weathering parameters must be investigated to find the relationship between these parameters and the arability of vegetation cover crowing in the specific area. The remote sensing packages and Matlab written subroutines may be use to evaluate the results.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More