The research aims to diagnose the causes of the phenomenon of Marketing deception catalog, which is now deployed in the Iraqi market and related to producers and marketers, consumers, regulators and other institutions) and their impact in the areas of prejudice to the consumer protection (product and signifying specifications, price, advertising, packaging), as well as identify differences in the sample responses according to personal variables, it has been the adoption of the resolution as a tool to collect data and information through a sample survey of consumer opinions totaling 108 people in shopping centers in the province of Baghdad and in the Karkh and Rusafa, It was the use of methods selected statistical represented by the arithmetic mean and standard deviation and test (F) and the coefficient of determination and sequence regression method test (X2) to find differences between the responses with the help of neo-statistical (SPSS) to obtain accurate results, and were the most prominent findings of the research are: 1. The reasons for the phenomenon of marketing deception catalog the effect of a significant level in the areas of breach of consumer protection. 2. The reasons for producers and marketers and consumer-related causes are the most influential in the areas of breach of consumer protection while ruled out the reasons for approaching the regulatory and other institutions of the regression model. 3. differences did not appear in the sample responses about the impact of the causes of the phenomenon of deception catalog in the areas of consumer protection prejudice attributable to personal variables.
In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10
... Show Moreمما توصل إليه البحث :
إن الدوافع النفسية تنفرد في تجسيد الأحاسيس والمشاعر في نتاج الشاعر , من خلال رؤيته لتلك الحالة , فتسهم في صورة المقارنة في التشبيه , فتبعث في المتلقي حالة التأمل والمقارنة بين الحالتين اللتين تجمع بين مكوناتهما صفة واحدة فتصل إلى حالة التلاحم , ويكون ذلك باعثا لرسم صورة التشبيه ال
... Show MoreGIS is characterized by great potentialeties to deal with huge geographical data and conclude what is necessary for it. It was very useful to get use of the potentialities of this system of GIS in the field of archaeology and to harvest very accurate results in a relatively short time, compared to the old archaeological methods.
Some great families in England had competed for the sake of getting authority and power in England.
This competition turned to be a bloody civil war which extended till 1455 and ended with the victory of Henry Tudor whose judgment in England started from 28th of August 1458, consequently a new dynast which is known as (the Tudor)has established
In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show Moreالمستخلص: يهدف البحث الى التعرف على بقاء اثر المعلومة عن طريق الاجابة عن السؤال: ما مدى بقاء اثر التعلم بين التعليم الالكتروني والتعليم االحضوري ؟ تم تطبيق البحث في العام الدراسي( 2020-2021 م) في العراق. تم استخدام المنهج الوصفي بالاسلوب المقارن في عقد مقارنة بين التعليم الالكتروني والتعليم الحضوري. وكان مجتمع البحث من طلبة المرحلة الرابعة كلية التربية للعلوم الصرفة – ابن الهيثم ,و العيتة من قسم الرياضيات الم
... Show Moreيعيش المجتمع العالمي أزمات بنيوية ونسقيه عميقة واختلالات وظيفية أسهمت في تنامي مظاهر الصراع المختلفة واشتداد تفجر الأزمات الهوياتية وتزايد الامراض الاجتماعية المقضة للعيش المشترك والمربكة لمظاهر التعايش والتآلف مع لجوء إنسان العصر الحالي الى التقوقع والاحتماء والانزواء تحت هويات ضيقة ونحل صغيره في مشهد يظهر مدى تراضي شبكة العالقات الاجتماعية على أداء وظائفها وأصبح عندها الاغتراب والقلق واللاتضامن والع
... Show More