Media theories and studies have provided many diligences on the concept of social media and the circle of influence, including the theory of social marketing which deals with how to promote ideas espoused by the elite in a society to become a recognized social value. The emergence of social networks provided a revolutionary breakthrough, taking the media to unprecedented horizons; and giving its users great opportunities to influence and move across borders without restrictions and censorship, except in a relatively limited manner. So, the emergence of social media has created channels of live broadcasting from its audience in a method of development that changes the essence of the known communication theories; and stops the monopoly of th
... Show MoreMedia theories and studies have provided many diligences on the concept of social media and the circle of influence, including the theory of social marketing which deals with how to promote ideas espoused by the elite in a society to become a recognized social value. The emergence of social networks provided a revolutionary breakthrough, taking the media to unprecedented horizons; and giving its users great opportunities to influence and move across borders without restrictions and censorship, except in a relatively limited manner.
So, the emergence of social media has created channels of live broadcasting from its audience in a method of development that changes the essence of the known communication theories; a
... Show MoreFreedom of opinion is one of the freedoms that constitutions and laws have guaranteed to protect and is exercised through the media. However, this freedom must be exercised within certain limits, which include respecting a person’s right to preserve his privacy, image and reputation. Just as the media has the freedom to exercise its right to publish and express its opinion with complete frankness, it is in return obligated to respect the rights of others and avoid defaming them and violating their privacy. If the media does this, the injured party has the right to demand compensation for the damage he has suffered as a result.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreAbstract
The research aims to measure the level of critical thinking skills among students of A’Sharqiah University in the Sultanate of Oman, as well as identify the level of their availability based on the variables: gender, academic level, school year, cumulative average, and general diploma / high school ratio. The researchers used the descriptive approach. To achieve the objectives of the study, they used The California Test for Critical Thinking Skills Picture (A) after evaluation (Farraj, 2006). It was applied to a sample of (487) students from A’sharqiah University. The results of the study found that the critical thinking skills of A’sharqiah University students are below the educationally acceptabl
... Show MoreBackground: Breast cancer is the most common malignancy affecting the Iraqi population and the leading cause of cancer related mortality among Iraqi women. It has been well documented that prognosis of patients depends largely upon the hormone receptor contents and HER-2 over expression of their neoplasm. Recent studies suggest that Triple Positive (TP) tumors, bearing the three markers, tend to exhibit a relatively favorable clinical behavior in which overtreatment is not recommended. Aim: To document the different frequencies of ER/PR/HER2 breast cancer molecular subtypes focusing on the Triple Positive pattern; correlating those with the corresponding clinico-pathological characteristics among a sample of Iraqi patients diagnosed with th
... Show MoreCultivation of the green seaweed Enteromorpha compressa was performed under natural laboratory spring environmental conditions of temperature, light intensity and photoperiod to study the salinity tolerance of this intertidal green macroalga. Cultivation was carried out under artificial seawater (ASW) of different concentrations (18, 35, 53 and 106 g/l sea salt) compared to the control using natural seawater (NSW). Growth rate and pigment content of the cultivated alga were recorded at regular intervals during the experimental duration. Antioxidant activity of the crude ethanolic extract and its fractions (petroleum ether, chloroform, ethyl acetate and acetone) was performed against DPPH radical scavenging assay and compared to
... Show MoreThis research discloses the synthesis of various polyester resins, the polyesters containing homoring aromatic and others heterocyclic were synthesized by the condensation polymerization of suitable monomers (which are containing variety function groups in different structures) with phthalic anhydride. The main objective is synthesis of new polyester with keeping a reasonable electrical insulating behavior. The structural of polymer was characterized by Fourier Transform infra-red spectroscopy FTIR and HNMR. The dielectric constant (real ε' and imaginary parts ε") and AC conductivity (σAC) for all the polyester samples are studied by varying the frequency (30, 50, 70, 90, 120, 300, 500Hz and 1KHZ) at 25⁰ C. Indeed, study of the electri
... Show MoreThe Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst
... Show MoreIn this paper some chalcones (C1-C8) are prepared based on the reaction of one mole of substituted acetophenone with one mole of substituted benzaldehydes in the presence of (40%) sodium hydroxide as a base. Pyrazolines (P1–P8) are prepared from the reaction of chalcones (C1-C8) with hydrazine hydrate. Isoxazoline (I1-I8) is prepared from the reaction of chalcones (C1-C8) with hydroxyl amine hydrochloride in the presence of (10%) sodium hydroxide as a base. These compounds are characterized by using various physical and spectral methods. The compounds are screened for their in vitro antibacterial activity using gram-positive bacteria and gram-negative bacteria. Several derivatives of pyrazolines and isoxazolines are produced well to moder
... Show More