The official spokesperson considered responsible for the transmission of information and communication messages that convey the government’s view on the various political and economic issues that affect the public opinion towards the performance achieved by the various governmental institutions and for the purpose of communicating with the media in a positive and effective manner, a number of institutions in the world in general and in Iraq in particular have nominated a spokesman to coordinate the efforts and the dissemination of news and the preparation of press conferences to contribute to the achievement of a positive and effective level between the government and the media, so this study has tackled to deal with the credibility of
... Show Moreلخلاصة تشغل قضايا الهوية محور اهتمام الكثير من الباحثين والدارسين في بنية المجتمعات ومستقبل الدول, وفي كثير من الدراسات التي كتبها هؤلاء كان هناك ميل نحو دراسة الهوية وعلاقتها بحركة الدول تقدما وتراجعا ,فهناك من عزا تقدم دولة ما إلى نجاح نخبها السياسية في صناعة هوية جامعة لحالة التنوع الذي يميز مجتمعها, ويمكن ان تشير الى الولايات المتحدة الامريكية كأنموذج للنجاح في هذا الاطار.وهناك من ارجع
... Show More
The varied applications of polystyrene in various fields of life led to examining the cause of radiation influence on some rheological behavior of commercial Polystyrene (PS) solution in the chloroform (CHCl3) solvent. Polystyrene grains shape samples were irradiated using the radioactive element Cesium- 137 with (9 µci) activity for 10, 20, and 30 minutes. The viscosity of the polymer solution depends on the concentration and size (i.e. molecular weight) of the dissolved polymer. Experimental data showed that the radiation dose affected the value of viscosity (shear, relative, specific, and reduced). The viscosity value significantly reduced at 10 min radiation dose and when increasing the dose, the viscosity value increased
... Show MoreBackground: Anti-vascular endothelial growth factors commonly used intravitreally for treatment of variable retinal disease worldwide, which help to regulate the upregulation of vascular endothelial growth factors due to ischemia or/and other retinal insult.
Objective: To review all cases of intravitreal bevacizumab given in the retinal unit of the Eye Specialty Private Hospital in Iraq from December 2015 to June 2016, pointing out the common indications.
Methods: A retrospective study including all cases of intravitreal injections of bevacizumab recorded at the Eye Specialty Private Hospital from December 2015 to June 2016 were retrieved. Age, sex, laterality, diagnosis
... Show MorePharmaceutical companies assign a budget for activities and promotions that aim to change the prescription habits of the physicians to choose the most suitable medications for their patients, which will eventually grow their sales. The study's objectives were to explore physicians' and medical representatives' perspectives on the criteria of impactful professional PP and the factors influencing the interaction between physicians and medical representatives. Qualitative in-depth interviews with flexible probing techniques were carried out in 2023. A semi-structured, open-ended interview questionnaire was used to interview physicians and medical representatives (MRs) from different private clinics in several governorates in Iraq. Ten physicia
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreIn this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show More