ه رثا قيقحتلو ،ةيبساحملا تامولعملا ةميق ةمئلام يف قيقدتلا ةنجلل ةيبساحملاو ةيلاملا ةربخلاو ةيللاقتسلاا ثحبلا تايضرف رابتخلا ةمزلالا تانايبلا عمجل ةنابتسا ةرامتسا مادختساب ةثحابلا تماق ةساردلا فده ةللاد وذ رثأ دجوي(يهو ةيبساحملاو ةيلاملا ةربخلل ةيئاصحإ ةللاد وذ رثا دجوي( ، )ةيبساحملا تامولعملا ةميق ةمئلام ىلع قيقدتلا ةنجل ةيللاقتسلا ةيئاصحا )ةيبساحملا تامولعملا ةميق ةمئلام ىلع ( نم تنوكت ةنيع ىلع تعزو ثيح ، 102 ترهظا دقو.فراصملا يف نيلماعلا نم ادرف ) ن ،ةيبساحملا تامولعملا ةميق ةمئلام ىلع قيقدتلا ةنجل ةيللاقتسلا ةيئاصحا ةللاد وذ رثا كانه ناب يفصولا يئاصحلاا ليلحتلا جئات ىلعءانبو.ةيبساحملا تامولعملا ةميق ةمئلام ىلع ةيبساحملاو ةيلاملا ةربخلل ةيئاصحا ةللاد وذ رثا دوجو جئاتنلا تنيب كلذكو دقت مت ةساردلا جئاتن نم تايصوت ةدع مي ةنجل يف ايلام اريبخ اوضع دوجو نع لاضف ،نيلقتسم ءاضعا دوجو ةرورض اهمها يف ةدراولا ةيبساحملا تامولعملا ةميق ةمئلام يف نيرمثتسملا ةقث ةدايز ىلا كلذ يدؤي دقو اهتيلعاف ىلع ارشؤم دعي ثيح قيقدتلا لاا مهرارق ىلع رثؤت دق اهرودب يتلاو ةيلاملا مئاوقلا .
هدف البحث التعرف على المعوقات التي تحول دون تطبيق تكنولوجيا المعلومات والاتصالات في كليات جامعة بغداد بأعتبار أن ذلك يمثل مشكلة لابد من الوقوف عندها , ولأهمية مثل هذه المواضيع وضرورة البحث عنها , إذ تحدد مجتمع البحث بالعمداء والمعاونيين في هذه كليات جامعة بغداد للعام الدراسي 2016-2017حيث قام الباحث ببناء اداة خاصة للبحث لغرض الاجابة على هدف البحث الرئيسي ومن خلال أجابات أفراد عينة البحث التي مثلت ما نسبته66% الى ا
... Show MoreThis study aims to identify both the importance of using (LinkedIn) and its drawbacks for researchers and specialists in the field of information and knowledge technologies. The study relied mainly on the statistical method (analytical method) from the collection of data tools (questionnaire) that was distributed electronically (Google Forms) to the sample community of (55) instructors. The feedback received illustrates that (46) instructors among those who participated in the questionnaire subscribed to (LinkedIn) and the rest did not. Their data was analyzed statistically, and the general arithmetic mean and the hypothetical mean was extracted for them to achieve the objectives of the study and prove their hypotheses. The site positively
... Show MoreThe study aims to study the geographical distribution of electricpower plants in Iraq, except the governorates of Kurdistan Region (Dohuk, Erbil, Sulaymaniyah) due to lack of data.
In order to reach the goal of the research was based on some mathematical equations and statistical methods to determine how the geographical distribution of these stations (gas, hydropower, steam, diesel) within the provinces and the concentration of them as well as the possibility of the classification of power plants in Iraq to facilitate understanding of distribution in a scientific manner is characterized by objectively.
The most important results of the research are that there are a number of factors that led to the irregular distribution
... Show MoreThe present research aims to know :
The level of Cognitive failures, information processing styles, and the problem-solving among the university students ,so it is aims to know the contribution of cognitive failures on the information processing styles and problem-solving, the research sample was (400) males and females student from the University of Wasit chosen randomly from both gender and for the study of the morning and evening .So these scales had been used as a research tool (failures cognitive scale ,the scale of information processing styles , and the scale of problem solving) , and by using the statistical m
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show More
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show Morethe research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.
To achieve this goal, the researcher has built a list of criteria according to the following steps:
First - identify the key areas covered by the whole list which are:
1 – Standards of system building and implementing with the operating screens.
2 – Standards of display forms including audio and video presentation.
3 – Standards which are related to the program philosophy.
4 - Standards which are related to the program objectives.
... Show MoreThe current research focuses on a major problem: the weak role of disclosing corporate information in the application of laws, regulations and instructions related to the application of corporate governance principles weakens the ability to protect the rights of shareholders and investors in companies listed on the Iraqi Stock Exchange and the study aims to study and analyze the role of disclosure and transparency in achieving the necessary protection to ensure the rights of shareholders. The study was applied to a sample of (42) analysis samples representing (84%) of the total questionnaires distributed to investors and shareholders in all listed companies in the Iraqi Stock Exchange. The results confirm the shareholder's right to obtai
... Show MoreFinancial Institutions are central to all most all Macroeconomic debates. They explain the market for money creation and Exchange the financial assets such as money stock and bonds play a central role in organizing and coordinating our economy. Financial Institutions’ position in economy is urgent position especially in the economic crises, they want to realize their profit target but this target conflicts with the target of monetary policy or fiscal policy or economic policy some time.
Financial Institution assets affect in technological factors and political factor. Those factors cause increasing or decreasing in wealth of the countries. The old classical crises was form real s
... Show More