يعد مفهوم العولمة ظاهرة عالمية كونها نزعة طاغية في الوقت الحالي منسوبة الى العالم ، ولم تدخل بعد قوائم المفردات في القواميس السياسية والاقتصادية . (الأسدي ،2004-ص88).وأن العولمة " Globlization أخذت مدلولان ، الاول يدل على الانفتاح وحرية التفكير ومتابعة الاكتشافات في مختلف المجالات والابتعاد عن الرتابة والروتين . اما الثاني فيدل على سطحية التفكير وحب التغيير لأجل التغيير ونبذ الماضي دون حكم او تفكير مسبق . ( سلاح شور، 2000- ص2) . وتتعلق العولمة بالجوانب الاقتصادية والاجتماعية والسياسية والثقافية والتربوية والنفسية من حياة الانسان . وما يجابه به الباحثين لدراسة هذا المفهوم هو كيفية تقديره وقياسه ؟ وما الاد اة المناسبة لتحقيق هذا الهدف ؟ وكيف يمكن بناؤها ؟ لمعرفة تأثيره في العلاقات الإنسانية .ولعدم وجود دراسات سابقة درست تأثير وسائل اتصال العولمة في العلاقات الإنسانية في البيئة العراقية ، فأن ذلك يعد المشكلة التي تصدى لها الباحث في دراسته .
Highlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elimina
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreThe aim of this research is to demonstrate the impact of credit risk on the banks of the study sample on the granting of loans and credit facilities, and try to reduce the size of credit risk to banks as a result of granting loans and credit facilities, credit risk is the oldest form of risk in financial markets. Every financial institution takes a degree of risk when it gives loans and credit facilities to companies and customers, It is exposed to financial losses when some borrowers fail to repay their loans as agreed, and at the same time credit facilities are the most profitable operations of the bank as it is the most profitable banking operations than other operations, so it represents the research communit
... Show MoreThe Impact of Intellectual trends on the nature of the Economic Structure of Iraq
Abstract
The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,
... Show MoreThis paper presents the motion programming and control of omni-directional mobile robot through the process of building and programming a small robotic platform with secondary design criteria of modularity and simplified control. This is accomplished by combining the positive aspects of several different robotics platform ideas. The platform is shaped like an equilateral triangle with a servo motor, sensors, and omni-wheel, controlled by a PIC microcontroller.
In this work the kinematics, inverse kinematics and dynamic module for the platform is derived. Two search algorithms (the wall-following search and the “most-open-area” search) is designed, tested, and analyzed experimentally.
What linguists mentioned about the infinitive and its use in the linguistic levels of speech, whether with its verb, or what was mentioned in the difference between the infinitive and the noun of the source, are matters that are related to the phenomenon of hearing in speech, a need necessitated by the nature of the linguistic law
Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.
An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo
... Show MoreCountries have faced the challenges of high levels of public debt and seek to define the optimum limits to reduce risks to which the financial system can be exposed and its impact on the economy as a whole. Hence the importance of research in studying the impact of internal and external public debt components on indicators of stability of the financial system for the period 2005-2017 for the purpose of knowing the extent of the financial stability indicators response to the high level of the public debt from its optimum ratio, as the aim of the research is to estimate and analyze the dynamic relationship of short and long term between the components of public debt and indicators of financial stability using the (ARDL) model that
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.