The visual impression represents a compound process of a group of concepts that might be secondary and interrelated to constitute, in reality, a cognitive image stored in the memory that can be retrieved according the implications of the situation in which the individual lives in his environment, as it awakens in him an image from the sub consciousness, thus it gets stimulated, and it is among the tangible things.
Since we live in our contemporary world under the development of knowledge, micro and wide technology of the devices, tools, materials, mechanisms, current developments and openness… etc. this transformation created visual impressions that the individual in general and the consumer in specific enjoys concerning his
This study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance
In this study, plastic wastes named (PET and PVC) were used to prepare polymer matrix composite (PMC) which can be used in different applications. Composite materials were prepared by mixing unsaturated polyester resin (UP) with plastic wastes, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with various weight fractions (0, 5,10,15, 20 and 25%) added as a filler in flakes form. In this work, some of the tests that were carried out included (tensile, bending, and compressive strength) as mechanical tests, in addition to (thermal conductivity and water absorption) as physical tests. The values of tensile, compressive strength and Young's modulus of UP increased after
... Show MoreThis research aims at highlighting the strategic role of human resource development in developing competitive advantage in light of the great challenges and rapid changes witnessed in recent years in the business world. The human element is the main engine of the organization's resources, especially when it possesses the skill quality and cognitive abilities commensurate with the nature of work. Therefore, this research focuses on the importance of human resources development strategy in contemporary organizations and reviews the summary of literature and theoretical foundations related to human resources development, as well as various philosophical concepts related to the competitive advantage and to indicate the important role
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreKlebsiella pneumoniae have an ability to form biofilm as one of strategies to persist and overcome host defenses. The study aims to evaluate the effectiveness of rosemary essential oil alone and in combination with some antibiotics against biofilm of K. pneumoniae isolated from urine. The antibiotics resistance pattern by disc diffusion method and minimal inhibitory concentration (MIC) of gentamicin, ciprofloxacin, amoxicillin, trimethoprim/ sulfame- thoxazole, cefotoxime and rosemary essential oil were determined. The ability to form biofilm as well as inhibition of biofilm formation of K. pneumoniae was performed. MICs 128, 0.25, 768, 64, 384 and 10 µg/ml were used. The effect of MIC and 1/2 MIC of antibiotics and rosemary essential oil
... Show MoreThe current research aims to evaluate the activities and evaluation questions implied in the content of the computer textbook for the fifth preparatory grade according to the creative thinking and developing suggestions through answering the following question: what is the percentage of creative thinking skills in the content of the computer textbook for the fifth Preparatory grade students issued by the Iraqi Ministry of Education/ Directorate General of the curriculum in the academic year (2019-2020)? The researchers followed the descriptive-analytical approach. The research community was determined by the content of the computer textbook for the fifth preparatory grade. As for the research sample, it was limited to all activitie
... Show MoreThis experiment was conducted at Poultry Research Station of the Animal Resources Research Department-Office Agricultural Research-Ministry of Agriculture in Iraq, during a period of 16 weeks (four periods and each period of four weeks) from 21 th April to 10 th August 2019. In this experiment 240 Japanese quail's female 9 weeks old, were used in this experiment. Females were randomly assigned to five treatments with three replicates per treatment (16 females/replicate). The experimental treatments were T1, T2, T3, T4 and T5 with an addition of Spirulina in an average of (0, 1, 2, 3, 4%) respectively in the diets of quail to study their effect on productive performance. The results of the experiment showed significant increase (P≤0.05) re
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More