The primary issue addressed in this research revolves around identifying the interactive elements provided by the Twitter platform and understanding their utilization by digital newspapers with official accounts. These newspapers broadcast content in line with their policies. This study is classified within descriptive research that employed a survey method and content analysis tool. The methodology relies on the "how was it said?" approach to categorize the analysis. The research yielded the following results:
Twitter utilized numerous interactive elements for disseminating tweets, which include "text, branching links, hashtags, digital images, digital videos, digital audio, and digital polls." However, these elements were not adopted by the digital newspapers, as they did not utilize digital audio and polls at all.
Change the morphological characteristics with the change of the factors affecting it has been shown that the Tigris River has the characteristics of the morphology of the low values in terms of depth, width and perimeter wet and gradient which in turn affected the morphological and other characteristics in terms of the direction and pattern of runoff came through the study of 48 cross-section is taken of the Tigris River Year 2008 by section for each 1 km, it has been shown that the average width of the Tigris River does not exceed 221.1 meters and the average depth of 3.9 meters either wet ocean amounted to 268.9 meters and changed the cross-section area of the last section at a rate of 4594.3 square meters, and through the study turned
... Show MoreA great abbey in the Shari'a, and is therefore destined to be preserved in many texts and by methods
There are many prayers in the Qur'an and Sunnah to encourage them
They have a clear relationship with the preservation of the purposes of the Sharia in general, and with a purpose
Save the mind in particular, but the scholars - the mercy of God - when they declare that the costs of Sharia
Due to the preservation of my intentions in the creature, they limit their words to orders and intentions, and are not exposed
In particular,
If they were included in the texts of the Shariah and Tawjiyatiya,
To be related to the preservation of the purposes of the law, which confirms the words of the former leaders, and light the li
The present study is a qualitative study that aims to investigate the way the Iraqi caricaturist,Dheaa Al-Hajjar uses caricatures to produce a satirical meaning humorously.Producing satire while at the same maintaining humor requires a creative thinking on the part of the caricaturist. Thus, the study examines the production of humorous satire in terms of creativity. The analysis is done from the cognitive linguistic point of view using Arthur Koestler's theory of bisociation as presented in his book The Act of Creation in 1964. The main principle on which the theory is based is that humor is created via linking (or bisociating in Koestler's terms) two habitually incompatible trains of thought in order to come up with a novel me
... Show MoreNarcissism is a complicated phenomenon that can be reflected in the narcissist’s language. Investigating narcissism in terms of linguistics, and pragmatics in particular, does not seem to have been given its due attention, as this study reveals. Thus, this study is an endeavor to discover how narcissism is reflected in the American movie Big Eyes (2014). It is known for introducing narcissistic behaviors. This paper aims to identify the types, motivations, and pragmatic manifestations of narcissism in the selected movie. Three pragmatic theories are chosen to scrutinize narcissism in the data: Searle’s speech acts (1969), Grice’s maxims breaching (1975), and Culppeper’s impoliteness (1996). To cope with the nature of the
... Show MoreWith the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.
This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos
... Show MoreThis study aims to determine the impact of organization values as an independent variable across its dimensions (organization management values, organization mission values, relations management values, and environment management values) on achieve the strategic success which is the dependent variable and include its dimensions (environmental analysis, creative thinking, strategic decision, effective implementation, and leadership capacities). The study is conducted in the Iraq Oil Ministry. It deployed the analytical descriptive approach. It focuses on the study problem enquiries throughout addressing several principal and sub-hypothesizes in regards to cause and effect relationship. To achieve this result
... Show MoreThis study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.
Employee Stealing or internal theft is considered from the passive practices that can’t be denied or be hidden, In spite of the hospital privacy as a serving organization that works 24\7 and deleing with human lives, they weren’t infallible from that kind of practice. To prevent or reduce this practice, it was important to search for the organizational and behavioral factors influencing internal thefts. The study problem briefly is to reach the most organizational and behavioral factors influencing internal theft, in governmental hospitals in Baghdad Rusafa Health district, this was done by analyzing (20) administrative cases of thefts occurred in the District, also a sample of (60) specialist Doctor’s opinion work, in (3) hospital
... Show MoreBackground: Radiopacity is one of the prerequisites for dental materials, especially for composite restorations. It's essential for easy detection of secondary dental caries as well as observation of the radiographic interface between the materials and tooth structure. The aim of this study to assess the difference in radiopacity of different resin composites using a digital x-ray system. Materials and methods: Ten specimens (6mm diameter and 1mm thickness) of three types of composite resins (Evetric, Estelite Sigma Quick,and G-aenial) were fabricated using Teflon mold. The radiopacity was assessed using dental radiography equipment in combination with a phosphor plate digital system and a grey scale value aluminum step wedge with thickness
... Show MoreThe research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticit
... Show More