This research delves into the role of satirical television programs in shaping the image of Iraqi politicians. The research problem is summarized in the main question: How does satire featured in television programs influence the portrayal of Iraqi politicians? This research adopts a descriptive approach and employs a survey methodology. The primary data collection tool is a questionnaire, complemented by observation and measurement techniques. The study draws upon the framework of cultural cultivation theory as a guiding theoretical foundation. A total of 430 questionnaires were disseminated among respondents who regularly watch satirical programs, selected through a multi-stage random sampling procedure.
The researcher arrived at several key findings, including: A majority of the surveyed audience perceives the image crafted of Iraqi politicians through satirical programs as predominantly negative. A smaller portion of respondents believe that satirical programs do not offer a clear image of Iraqi politicians. Additionally, most respondents point to the portrayal of Iraqi politicians' inability to deliver services to citizens as a prominent negative trait accentuated by satirical programs. These programs tend to omit any portrayal of positive attributes or the stances of politicians who prioritize upholding the Iraqi constitution.
Municipalities.
Abstract
The purpose of this research is to measure the impact of regulatory flexibility dimensions (formal and authoritarian procedures) to achieve response to the requirements of high performance dimensions (the effective recruitment, intensive training, motivate employees, participation of workers) in the general municipal Directorate as one of the directorates of the Ministry of Municipalities and Public Works. For the purpose of this measure it has been selected sample composed of 88 individuals from the research community represents the levels of assistant general manager of department heads and managers of people and some of the staff to answer the questionnaire prepared for the purpose Hama
... Show Moreالتجريد في النحت العراقي المعاصر
المتغير في النحت العراقي المعاصر
الابعاد السلبية لعسكرة المجتمع العراقي
عرض كتاب ثلاثية النفط العراقي
L'ouverture des frontières et la mondialisation des échanges,comme les projets de l'intégration font de la connaissance de langue un enjeu essentiel ,professionnel et culturel,pour le citoyen de demain.
L'Irak est un pays Anglophone où domine l'anglais,le français est considérée comme deuxième langue étrangère en Irak.
Notre mini-mémoire se compose de deux parties.Dans la première partie nous essayons d'examiner la place du français en Irak qui nous dirige à savoir pourquoi on apprend le français en Irak et qui l'apprend?Est –ce qu'il y a une coopération française?
Dans la deuxième partie nous examinons les problèmes du français en Ir
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThe current research aims to identify the " impact of strategic warheads numbered ( NHT) in the collection average second grade students in the article of history). " To achieve this, I assumed the researcher that there is no different between the statistically significant the average score for the collection of experimental group who teaches the Arab Islamic history on and a strategic warheads numbered and the average score for the collection of the control group who were studying the same article according to the classic method ( traditional) . The study sample consisted of 64 students from the second grade average in the secondary warka bin nawfal in the general Directorate for education first karkh in Baghdad for the annual cources 2
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show More