Information pollution is regarded as a big problem facing journalists working in the editing section, whereby journalistic materials face such pollution through their way across the editing pyramid. This research is an attempt to define the concept of journalistic information pollution, and what are the causes and sources of this pollution. The research applied the descriptive research method to achieve its objectives. A questionnaire was used to collect data. The findings indicate that journalists are aware of the existence of information pollution in journalism, and this pollution has its causes and resources.
The variation in wing morphological features was investigated using geometric morphometric technique of the Sand Fly from two Iraqi provinces Babylon and Diyala . We distributed eleven landmarks on the wings of Sand Fly species. By using the centroid size and shape together, all species were clearly distinguished. It is clear from these results that the wing analysis is an essential method for future geometric morphometry studies to distinguish the species of Sand Flies in Iraq.
This study sought to determine the impact of spreading the culture of quality in improving the quality of tourism service in some hotels in Erbil governorate. The theme of excellence in providing service and attention to it has become the concern of most organizations in general and tourism service organizations in particular. Tourists try to establish the mental status of customers about their tourism organizations had to pay attention to the quality of service provided to the customer and work to develop them to the advanced stages of satisfaction and happiness of customers and this will certainly positively affect the improvement of service in the tourism sector, Of the research variables were examined statistically by distrib
... Show MoreThe great challenge that will face the management in the developed and developing countries at the same time as core issue is represented in the question of the labor productivity in the field of in the Training Of human which is believed that it will prevail upon the jobs of their organization for many coming decades in in next years. Farther more, it will limit the construction of the communities and the quality of this life. Therefore, the priority of the economics of those countries will be headed toward increasing this productivity and giving it tried finally to control economically and managerially. In the light of information era, every organization should become knowledgeable enterprise. And for this reason, the achievement of su
... Show MoreRenal transplantation is a principal treatment option for end-stage kidney failure. Bone loss and fracture are serious complication of kidney transplantation, associated with morbidity and mortality. The pathogenesis of post transplantation bone loss is multifactorial and complex
Abstract Metabolic syndrome (MS) is a group of clinical and biological abnormalities included risk of insulin resistance , disorders in glucose metabolism , abdominal obesity and abnormal lipid profile these features confer a greater risk of cardiovascular diseases . Anyway, the co-occurrence of diabetes mellitus and metabolic syndrome potentiates the cardiovascular risk associated with each of the two conditions. The present study aimed to determine a relationship between prolactin level in type -2- diabetic Iraqi women and metabolic syndrome, as well to find a relationship between prolactin level and other studied biochemical markers. seventy menopausal diabetic women with metabolic syndrome with age in range (45-50) years were enrolled i
... Show MoreBackground: Central serous chorioretinopathy (CSCR) is an idiopathic condition aggravated by exogenous or endogenous glucocorticoids. Vascular deregulation in the choroid is a new hypothesis regarding central serous chorioretinopathy occurrence. The inhibition of choroidal mineralocorticoid receptors has a great role in shortening the duration of CSCR by inhibiting choroidal vasodilatation and leak.
Objective: To assess the effect of oral spironolactone on subretinal fluid, central macular thickness and visual acuity in patients with acute CSCR compared to observation.
Subjects and Methods: a hospital based, randomized clinical trial carried out at outpatient clinic in Ibn-Alhaitham Teaching E
... Show MoreSummary:
This research revolves around the probing of those whom Ibn Hajar said, "He has a vision", its significance, and the ruling on the connection and transmission to it. The number of narrators reached fifty-one (51) narrators, among whom it was said, “He has a vision, whether it is definite or possibly. Some of them had a vision and companionship.”They are eleven (11) narrators, And among them were those who had visions and had no company, and their number was twenty-one (21) narrators, and among them were those who had no vision and nor company, and their number is nineteen (19) narrators.
As a result , whoever said about him “has a vision” and has companions, his hadith is connected, even i
The comparative study tries to find the common points in two different authors’ works and in this kind of studying so many other common but the hidden points may be revealed. Postwar literature is somehow one of the best literary genres for finding the common factors and features that the poets have tried to present in their works elements such as desire to be winner, cruelty, inhumanity, and absurdity of the war. The Iranian poet late Qaisar Aminpour(1961-2007) and Yusef Komunyakaa ( 1947) from Bogalusa, Louisiana, are among the great American and Iranian poets whose works so many times have been interpreted and analyzed. The finding the outstanding and the most important points and themes in the postwar poems of these
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More