The aim of the research is to identify the educational and psychological effects of the positive and negative aspects of using social networking websites. The researcher administered a number of questions to (250) users of different types of social networking websites. He analyzed his research results and obtained a number of results. The research has reached a number of recommendations and suggestion: Regulating the use of social media. Monitoring the parents of the sites used by children in a way that they do not feel they are observers. It is necessary to devote an hour daily to show the importance of real social life for children other than using social media. It is necessary to show the importance of choosing friends who have a good reputation. It is necessary to assign a little time each week to meet family outside the house or visit relatives that help children to communicate with other changing the electronic communication to the real social media. It is necessary to show television programs to alert young people to the dangers of addiction to the psychological and educational internet. It is necessary to prepare annual calendar posters that alert students in schools and universities to the type of risks, including the risks of incorrect use of the Internet. It is necessary to prepare an educational curriculum that is not intended for the exam and does not fall within the exams and grades in the schools and universities, as much as it aims to build psychological and educational values according to the customs and traditions of ancient Iraq.
التجريد في النحت العراقي المعاصر
المتغير في النحت العراقي المعاصر
لا يتسع هنا المجال لأستعراض كامل الخلفيات التاريخية التي انتجت اوضاعنا الاجتماعية والاقتصادية والسياسية المتأزمة الحالية، وجل ما يمكن قوله هو ان الشعب العراقي وخلال ما يربو على ربع قرن لم يحصد سوى عدد من الحروب والعقوبات الدولية فالازمات التي ولدت الرعب والجوع المستمر للشعب حتى يومنا هذا.
لقد كان الاقتصاد الوطني اول واكبر المتضررين من تلك الازمات ومن سياسات الدولة غير العقلانية فكانت ال
... Show Moreعرض كتاب ثلاثية النفط العراقي
L'ouverture des frontières et la mondialisation des échanges,comme les projets de l'intégration font de la connaissance de langue un enjeu essentiel ,professionnel et culturel,pour le citoyen de demain.
L'Irak est un pays Anglophone où domine l'anglais,le français est considérée comme deuxième langue étrangère en Irak.
Notre mini-mémoire se compose de deux parties.Dans la première partie nous essayons d'examiner la place du français en Irak qui nous dirige à savoir pourquoi on apprend le français en Irak et qui l'apprend?Est –ce qu'il y a une coopération française?
Dans la deuxième partie nous examinons les problèmes du français en Ir
... Show MoreThis study aims to create spatial balance between two Iraqi writers' novels (Maysaloon
Hadi, Alya Talib) technical and objective illustrates similarity points and difference in the
writers' style. We depended in our research on spatial classification considering the aggressive
and friendly, since the writers focused on them.
The research study concluded to many sides, some of which are similar and some are
different. Firstly, ingenuity description of the writers. Followed by the deep connection they
have. Because of the personal experience it emanated from alienation sensations and nostalgia
to deep roots to homeland.
On the other hand, difference aspects, we see Maysaloon takes symbols and illusions
unlike Aly
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreMultilevel models are among the most important models widely used in the application and analysis of data that are characterized by the fact that observations take a hierarchical form, In our research we examined the multilevel logistic regression model (intercept random and slope random model) , here the importance of the research highlights that the usual regression models calculate the total variance of the model and its inability to read variance and variations between levels ,however in the case of multi-level regression models, the calculation of the total variance is inaccurate and therefore these models calculate the variations for each level of the model, Where the research aims to estimate the parameters of this m
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More