الطائفية وتداعياتها على بناء الدولة العراقية المعاصرة
The United States government allowed Native Americans to abandon their reservations in the 1950s and 1960s. The historical, social, and cultural backgrounds shaped the forms and themes of works by American Indian writers who urged people to refuse their culture's sense of shame. Moreover, their behavior corresponded with the restoration of individuals to their rituals after disappointment, loss of sense of life, and mental illness performed from the influence of mainstream American society. Among these writers, N. Scott Momaday and Leslie Marmon Silko participate in similar interest in portraying characters caught between indigenous beliefs and white mainstream standards.
The construction of
... Show Moreتهدف الدراسة الى بناء مقياس التهكم التنظيمي للمعنيين بالاتحاد العراقي المركزي بالكرة الطائرة. تحديد الدرجات والمستويات المعيارية لمقياس التهكم التنظيمي للمعنيين بالاتحاد العراقي المركزي بالكرة الطائرة.وقد استخدم الباحثون المنهج المسحي على مجتمع البحث وعينته المتمثلة بالمعنيين من حكام واداريين ومدربون بالكرة الطائرة إذ بلغت العينة (185) فرداً، وبعد ذلك أجريت إجراءات البناء واختيار المجالات والعبارات ومن
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThis paper presents a method of designing and constructing a system capable of acquiring
the third dimension and reconstructs a 3D shape for an object from multi images of that object using
the principle of active optical triangulation. The system consists of an illumination source, a photo
detector, a movement mechanism and a PC, which is working as a controlling unit for the hard ware
components and as an image processing unit for the object multi view raw images which must be
processed to extract the third dimension. The result showed that the optical triangulation method
provides a rapid mean for obtaining accurate and quantitative distance measurements. The final
result's analysis refers to the necessity of usin
The great challenge that will face the management in the developed and developing countries at the same time as core issue is represented in the question of the labor productivity in the field of in the Training Of human which is believed that it will prevail upon the jobs of their organization for many coming decades in in next years. Farther more, it will limit the construction of the communities and the quality of this life. Therefore, the priority of the economics of those countries will be headed toward increasing this productivity and giving it tried finally to control economically and managerially. In the light of information era, every organization should become knowledgeable enterprise. And for this reason, the achievement of su
... Show MoreThe objective of the research is to identify the nature of voluntary disclosure of insurance services and its impact on the financial performance of Iraqi insurance companies by knowing the relationship between increasing disclosure of financial services and financial performance indicators of insurance companies.In order to achieve this objective, the research was applied to a sample of the Iraqi insurance companies listed in the Iraqi Stock Exchange (Al Amin Insurance Company, Al Ahlia Insurance, Dar Al Salam Insurance, Gulf Insurance, Al Hamra Insurance) and based on their published financial statements (2014-2015) ) And by analyzing the sample lists were connected to the research objectives.The main conclusion of the study is that in
... Show MoreThe banking sector is currently facing great challenges resulting from intense competition in the financial environment, and this is what makes the supreme audit bodies and the Central Bank audit as the highest supervisory authority on banks in order to achieve profit and not be exposed to loss, and this requires identifying the banking strengths and risks that constitute points Weakness that affects the future performance and the life of the bank, which requires special supervisory care, and from this point of view, the research aims to use the CAMELS model as a control tool in banks, through the use of its six indicators: capital adequacy, asset quality, management quality, profits, liquidity And sensitivity to market risks, th
... Show More