The primary issue addressed in this research revolves around identifying the interactive elements provided by the Twitter platform and understanding their utilization by digital newspapers with official accounts. These newspapers broadcast content in line with their policies. This study is classified within descriptive research that employed a survey method and content analysis tool. The methodology relies on the "how was it said?" approach to categorize the analysis. The research yielded the following results:
Twitter utilized numerous interactive elements for disseminating tweets, which include "text, branching links, hashtags, digital images, digital videos, digital audio, and digital polls." However, these elements were not adopted by the digital newspapers, as they did not utilize digital audio and polls at all.
Employee Stealing or internal theft is considered from the passive practices that can’t be denied or be hidden, In spite of the hospital privacy as a serving organization that works 24\7 and deleing with human lives, they weren’t infallible from that kind of practice. To prevent or reduce this practice, it was important to search for the organizational and behavioral factors influencing internal thefts. The study problem briefly is to reach the most organizational and behavioral factors influencing internal theft, in governmental hospitals in Baghdad Rusafa Health district, this was done by analyzing (20) administrative cases of thefts occurred in the District, also a sample of (60) specialist Doctor’s opinion work, in (3) hospital
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreSummary: The study focused on the role of the educational counselor in schools, as an integral part of the educational system that faces multiple challenges and difficulties. In this context, the counselor’s role becomes crucial in attempting to reduce or eliminate such difficulties, in addition to guiding students in an appropriate manner. Methodes: The study employed a descriptive field approach, using interviews and direct observation as tools to examine the actual role performed by school counselors. Results: The study concluded with several key findings, most notably the numerous challenges faced by counselors, including students’ negative behaviors, school dropouts, and the limited administrative support for counselors’ work. Fu
... Show MoreThe aim of this work is to provide an efficient selection technique as a part of planning process to guide the decision makers to decide the preferences of one supplier over another for purchasing lab instruments in education domain. Fuzzy Analytical Hierarchy Process has used as a multi-criteria decision process, as an industrial engineering tool with certain emphasis on the qualitative aspects required to the decision makers. While the concept of degree of possibility for each criterion is used to reach its relative weights, a specific methodology created to reach the final objective decision of supplier selection. A questionnaire form was developed and distributed to five universities located in Baghdad province with a total
... Show MoreBackground: Proper cleaning and shaping of the whole root canal space have been recognized as a real challenge, particularly in oval-shaped canals.This in vitro study was conducted to evaluate and compare the efficiency of different instrumentation systems in removing of dentin debris at three thirds of oval-shaped root canals and to compare the percentage of remaining dentin debris among the three thirds for each instrumentation system. Materials and methods: Fifty freshly extracted human mandibular molars with single straight oval-shaped distal root canals were randomly divided into five groups of ten teeth each. Group One: instrumentation with ProTaper Universal hand instruments, Group Two: instrumentation with ProTaper Universal rotary
... Show MoreSince the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreThis study dealt with the management strategy as an independent variable and the integrated industrial distribution as a variable. The study aimed at finding the integrated industrial distribution that fits with the management strategy in providing the needs of the firm on the one hand and reducing the cost of management that is reflected in increasing its profits.
The researcher selected the data from (130) decision makers in the corporation and used the questionnaire as a tool for collecting data and used a set of statistical tools and tools suitable for the nature of information and were processed using the data analysis system (SPSS version 24) Based on the analysis of the responses of the sample and the test of correlation and
Abstract
This research aims to examine the correlation and the influence of Authentic Leadership on the contextual performance as a dependent variable, in the departments and Division of the iraqi Ministry of Foreign Affairs To try out with a number of recommendations that contribute to raising the level of contextual performance in the Ministry. Starting from the importance of research in public organizations and its Role in society, the researcher adopted the descriptive analytical approach in accomplishing this research, The 99 people responded exclusively comprehensively, based on questionnaire that is include 28-item, using interviews and field observations as
... Show MoreA real method of predication brake pad wear ,could lead to substantiol economies of time and money. This paper describes how such a procedure has been used and gives the results to establish is reliability by comparing the predicted wear with that which actually occurs in an existing service. The experimental work was carried out on three different commercial samples ,tested under different operation conditions (speed,load,time...etc)using a test ring especially modified for this purpose. Abrasive wear is mainly studied , since it is the type of wear that takes place in such arrangements. Samples wear tested in presences of sand or mud between the mating surfaces under different operational conditions of speed, load and braking time .Mec
... Show MoreThe letter is defined as a message directed by the sender to another party, the future. The aim is to convey, clarify or explain a particular point or subject, and in the form of direct oral communication through speech that contains a set of words and words, The future can discuss the sender directly to exchange ideas with each other, or it may be written and in this case does not require direct interaction between the matchmaker and the recipient. As a result of the different sources and topics of the discourse, and the different types of categories addressed to the speech, and the number, it has been divided into several types.
And schools of discourse analysis emerged in the early eighties of the last century and has spread and ha