Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental image and its components; section two is about the concept of political parties, their elements, and classifications; section three discusses the title ‘the effectiveness of the function of public relations in the concept and aims of public parties. Chapter three is about a field study.
Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppre
Abstract:
The research aims to identify the concept of trading securities in Iraq and to propose a new mechanism for the taxation of trading profits and the extent of its impact on tax revenues, as it was observed that there are professional investors in the trading market and some of them achieve huge annual profits. and this profit should be like other taxable profits. The General Commission of Taxes and in cooperation with the Iraq Stock Exchange should identifying those profits, subjecting them to income tax, and adding them to the tax base. The researcher relied on the use of the descriptive and analytical approach bas
... Show MoreThis research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show MoreThe present research aims at identifying the impact of S.N.I.P.S strategy on the achievement of fifth grade students in natural geography
For the purpose of verifying the objective of the research, the researcher put the following zero hypothesis: There is no statistically significant difference at the level of (0.05) between the mean score of experimental group who study according to the (S.N.I.P.S) strategy, and the mean score of control group who study according to the traditional method in the achievement test.
In order to verify the validity of this null hypothesis, the researcher adopted the experimental method. Two groups of (60) fifth grade literary students were collecte
... Show MoreThis study aims to find out the effectiveness of a cognitive-behavioral counseling program in enhancing self-management in reducing the academic procrastination of tenth-grade male students. The sample consisted of (26) male students divided into an experimental group of (13) students and a control group of (13) students. Two scales of self-management and academic procrastination were used, prepared by the researcher. The counseling program was prepared by the researcher. The results showed the program's effectiveness in enhancing self-management and reducing academic procrastination in the posttest, as it showed the continuation of this enhancement in self-management and the increase in the reduction of procrastination in the follow-up
... Show MoreA revolution called information revolution has recently invaded the world. It is Currently considered one of the most important properties of development to the countries of the world The criteria provided by computers such as accuracy, speed, time saving Storage and restore have led them to be widely used in economy, industry, agriculture, communications, etc., as well as being the major finder of reengineering the operations of innovation. The use of computers in the preparation of budgets will lead to achieve accuracy. Since, the operation draws upon the statistic and quantity estimations about budget items, the computerized balance sheet may save time and effort of preparing mathematical equations annually. According to the problem o
... Show MoreThe research seeks to identify the correlation relationship between strategic intelligence and fifth preparatory students’ achievement in mathematics. To achieve this objective, stratified random sampling were used based on participants’ gender and the branch of study. The sample consisted of (200) male and female fifth preparatory students for both (literary and scientific branch) who were displaced to Arbil city in Iraq for the academic year 2016-2017. As for research tool, the researcher administered strategic intelligence test to the study sample in the second semester which was designed by Ibrahim (2017), it includes (30) items divided into five domains (predictability, organized thinking, future view, motivation, and pa
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.