ريل لسادة الكيسياء َ جؼ البحث الى التعخؼ عمى أثخ استخاتيجية فجػة السعمػمات في التح َى جؼ البحث فقج صيغت الفخضية التي َ تػسط , والتحقق مغ ى ُ جى شلاب الرف الثاني الس َ ل جؼ البحث أعتسج الباحث َ تتعمق بالتحريل ولتحقيق ى ػعتيغ متداويتيغ ُ بي لسجس ِ ي السشيج التجخ ريل الجراسي , تكػنت عيشة البحث مغ َ ) شالب مغ شلاب ٗٛ( ذواتي اختبار بعجي لمتح -ٕٕٕٓالرف الثاني الستػسط في ( متػسصة الذييج خزيخ جاسع العارضي ) لمعاـ الجارسي ( ا ٕٗ) حيث بمغ عجد شلاب السجسػعة التجخيِبية (ٕٕٖٓ َ ) شالب , ٕٗ ) شالب و الزبصة ( ت السجسػعتاف في بعس الستغيخات ( العسخ الدمشي بالذيػر , التحريل الجراسي لمػالجيغ َ وكػفئ , اختبار الحكاء , اختبار السعمػمات الدابقة لسادة الكيسياء ) , تع اعجاد اختبار تحريمي لسادة فقخة مػضػعية مغ نػع الاختيار مغ متعجد , وتع (40)الكيسياء وتألف اختبار التحريل مغ جسػعة الزابصة َ ت الس ُ فق استخاتيجية فجػة السعمػمات ودرس ُ جسػعة التجخيبية عمى و َ تجريذ الس جسػعتي البحث ُ تبار التحريل عمى كلا م ُ نتياء التجخبة شبق اخ ِ تيادية وعشج ا َ خيقة اع َ وفق الص . ابصة َ يبية والز ِ التجخ وقج أضيخت الشتائج ػد فخؽ ُ : الى وج ُ ذ ج مدتػى دلالة َ و دلالة احرائية عش (0.05) جػة َ يجية ف ِ ات ػا عمى وفق استخ ُ بية الحيغ درس ِ ي جسػعة التجخ ُ تػسط درجات شلاب الس َ غ م ِ بي جات شلاب السجسػعة الزابصة الحي درسػا عمى وفق الصخيقة َ السعمػمات وبيغ متػسط در الاعتيادية في الاختبار التحريمي لرالح السجسػعة التجخيبية
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreThe present research aims to know :
The level of Cognitive failures, information processing styles, and the problem-solving among the university students ,so it is aims to know the contribution of cognitive failures on the information processing styles and problem-solving, the research sample was (400) males and females student from the University of Wasit chosen randomly from both gender and for the study of the morning and evening .So these scales had been used as a research tool (failures cognitive scale ,the scale of information processing styles , and the scale of problem solving) , and by using the statistical m
... Show More
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
the research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.
To achieve this goal, the researcher has built a list of criteria according to the following steps:
First - identify the key areas covered by the whole list which are:
1 – Standards of system building and implementing with the operating screens.
2 – Standards of display forms including audio and video presentation.
3 – Standards which are related to the program philosophy.
4 - Standards which are related to the program objectives.
... Show MoreThe study aims at:
1- Identifying the contemporary educational approaches in teaching arts.
2- The effectiveness of using the visual thinking strategy in photography subject for the first year students in the institute of fine arts/Holy city of Kadhimiyah.
The study sample is made of (30 ) first year students (in the institute of fine arts/in Holy city of Kadhimiyah) distributed into two groups, an experimental group made of (15) students and a control group having the same number of students in order to conduct the test. The test for the visual thinking strategy in the subject of photography has been designed and the validity and reliability for the research tool have been verified. In order to demonstrate the results of the
One of the globalization results is (VAT) , so it is important to consider its results and impact on the tax system.
The Iraqi economy having wittnisd an acute transition period , still in need for a better care in aim to back it, especialy from the tax system.
The research is concerned with the (VAT) and its details –And for five chapters all the problomes connect are displayed .But yet the new system does not comply with the modern development and this is one of the defects of (VAT) in Iraq.
The history of (VAT)was also studied mentiorned and studied.
As a conclusion (VAT) is one of the m
... Show MoreThe current research aims to identify the Impact of strategy of modeling in the of deductive thinking and the attitvde towards mathematics among students in the high school stage
through check the following hypotheses:
1.There is no difference statistically significant at the level (0.05) between the scores mean of the experimental group students who have studied according to the modeling strategy and scores of control group students who have studied according to ordinary method in deductive thinking.
2.
... Show MoreThe research aims to identify the tax policy strategy adopted in Iraq after the change of the tax system in 2003 and beyond, and then make a comparison of the two strategies on corporate data whether they are charged with progressive tax rates and after the change of the system as the tax rates became fixed, and then indicate the changes In the tax proceeds, and knowing the dimensions of the approved tax policy, is it a tax reform strategy or a strategy to attract investments.
The research started from the problem of exposure of the Iraqi tax system to several changes in the tax strategy from 2003 until now, as this led to a reflection on the technical organization of taxes, in terms of the tax exemption.And these many amendments
... Show MoreThe research is conducted on target of investigating the role of growth strategy via diversification in value maximization of a firm in terms of controversies literatures had witnessed. Using a descriptive approach for analyzing and verifying the harmony of variables of research and their conceptualized logic , it could be reached to many conclusions agreed in their essence upon that the related diversification has the major role in value maximization of a firm and the wealth of its owners .