This research aims at identifying the nature of addressing the Middle East issues in the talk shows in the foreign channels speaking in Arabic "France 24, a model", and identifying the extent of interest of the channel in addressing middle east issues in the talk shows, the nature of the guests and the hosts, methods of addressing the issues, and the technical features that characterize the presenter of the research sample program. This research is considered an analytical descriptive study. It depends on the analysis of the content of the series of the weekly talk show "a week from the world" on the French channel (France 24) during the period (August 1/July 31 2018).
The most important results indicated that the foreign channels sp
Baghdad Lake Touristic is suffering from a lake of tourism and entertainment services
efficiency provided to their visitors , knowing that this type of services as they are the basics
to achieve economic and socialist development because of their indicators where their goal is
to serve human in city as they represent lungs which population breathe within .
The Parks are resorted as human usually in search of quiet and funny places , away from
the noise of the city and its complex , as well as they give the city a beauty manifestations ,
that give happiness.
The study reached that there is deficiencies in service present, inability to provide
services and inadequate for the population and bad distribution. So the s
The study aims to identify the degree of implementation of the coronavirus prevention standards (covid-19) in the kingdom of Saudi Arabia and compare it with the families of intellectual disabilities. The study population consisted of all families residing in the Kingdom of Saudi Arabia. To achieve the objectives of the research, the analytical descriptive approach was employed. The study sample consisted of (372) families, among them (84) families with intellectual disabilities, and (288) families without intellectual disabilities. They were chosen from the Saudi community according to what is available for collection in a simple random way, using the standard criteria for the prevention of coronavirus (Covid- 19) Prepared by the resear
... Show MorePurpose: The current research attempts to diagnosis the reflection level of Information Technology (IT) Capabilities (Architectural, infrastructure, human resources, relationships resources, and dynamic capabilities) at Baghdad soft drinks Company/Al- Zafaraniya to achieving the competitive superiority represented by indicators (Cost, quality, flexibility, delivery and innovation). Recognizing the importance of the subjects studied, and because of the importance of the expected results of the field under consideration.
Design/Methodology/Approach: The experimental method has been used, the questionnaire used to collect th
... Show MoreThe purpose of the research is to present a proposed accounting system model for converting and aggregating accounting information within the framework of the differentiated accounting systems, and the research methodology consists of: The research problem is the existence of differentiated and dispersed accounting systems that operate within governmental economic units and at the same time seek to achieve a unified vision and goals for the organization, and the central research hypothesis is the possibility of conducting the process of conversion accounting information from the government accounting system to the unified accounting system, and then aggregate those systems. The research was conducted at the College of Administrat
... Show Moreبهذا البحث نقارن معاييرالمعلومات التقليدية (AIC , SIC, HQ , FPE ) مع معيارمعلومات الانحراف المحور (MDIC) المستعملة لتحديد رتبة انموذج الانحدارالذاتي (AR) للعملية التي تولد البيانات,باستعمال المحاكاة وذلك بتوليد بيانات من عدة نماذج للأنحدارالذاتي,عندما خضوع حد الخطأ للتوزيع الطبيعي بقيم مختلفة لمعلماته
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreAbstract
The economic and financial crises in the world economy series led to increased awareness of the importance of the internal control system, because it is one of the main pillars of any economic unit, as it works to verify the application of policies, regulations and laws and verification of asset protection from theft and embezzlement procedures, it is also working on trust accounting information imparted through the validation of accounting information, analyze and detect the misleading.
The existence the internal control system a factor in many of the accounting practices that limit the ability of the administration to produce misleading financial reporting
The
... Show MoreThis research aims to clarify the role of Information Technology Competency (ITC) with dimensions' (IT Usage, IT Knowledge, and IT Operations) as an independent variable in the activation of Human Resources Management Practices (HRM Practices) as a dependent variable with dimensions' (Training and Development, Recruitment, Job Design, and Performance appraisal). Based on this, the correlation and effect relationships between the independent and dependent variables are determined by formulating two main hypotheses. There are a significant relationship and effect of IT competency with HRM practices within the dimensions. Furthermore, the scope and population of this research are the Informatics and Communications P
... Show More