The research aims to identify and diagnose the public relations strategies in its digital online communications by the United Nations High Commissioner for Refugees (UNHCR) in managing the crisis of Iraqi refugees in Turkey. A content analysis form was designed for the digital content of the UNHCR's website dedicated to topics and issues concerning Iraqi refugees that were covered by the site, adopting a comprehensive enumeration approach. The study covered the period from 01/03/2022, to 30/06/2022. The research yielded several key findings, including the predominant use of media, advertising, and education strategies in managing the crisis of Iraqi refugees in Turkey. News and reports ranked first among the media arts used in public relations. There is evident cooperation between the public relations departments of the UNHCR and the Iraqi embassy in Turkey in managing political crises.
The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreInternational responsibility rises against the United Nations Organization for the actions of the Security Council according to the theory of risks, in the event that ships, submarines and aircraft carriers that operate with nuclear energy are launched against countries that violate the provisions of Chapter VII the Charter of the United Nations, considering that the Council's actions here are considered as internationally legitimate acts of exceptional risks that the Council may resort to it in order to ensure the speed and effectiveness referred to in Article (11 / Paragraph 2) of the charter and to keep pace with developments in modern technology.
Bioethanol production from sugar fermentation is one of the most sustainable alternatives to substitute fossil fuel. production of bioethanol from low grade dates which are rich of sugars. An available sugar from a second grade dates (reduction sugar) was 90g/l in this study. Sugar can be served as essential carbon sources for yeast growth in aerobic condition and can also be converted to bioethanol in anaerobic condition. The effect of various parameters on bioethanol production, fermentation time, pH-values, inoculum size and initial sugar concentration were varied in order to determine the optimal of bioethanol production. The highest bioethanol yield was 33g/l which was obtained with sugar concentration 90 g/l, inocu
... Show MoreThe work in this paper focuses on the system quality of direct and coherent communication system for two computers. A system quality is represented by Signal to Noise ratio (SNR) and Bit Error Rate (BER). First part of the work includes implementation of direct optical fiber communication system and measure the system quality .The second part of the work include implementation both the( homodyne and heterodyne)coherent optical fiber communication system and measure the system quality . Laser diode 1310 nm wavelength with its drive circuit used in the transmitter circuit . A single mode of 62.11 km optical fiber is selected as transmission medium . A PIN photo detector is used in the receiver circuit. The optical D-coupler was u
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreIn recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication
... Show MoreNowadays, a very widespread of smartphones, especially Android smartphones, is observed. This is due to presence of many companies that produce Android based phones and provide them to consumers at reasonable prices with good specifications. The actual benefit of smartphones lies in creating communication between people through the exchange of messages, photos, videos, or other types of files. Usually, this communication is through the existence of an access point through which smartphones can connect to the Internet. However, the availability of the Internet is not guaranteed in all places and at all times, such as in crowded places, remote areas, natural disasters, or interruption of the Internet connection for any reason. To create a
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreTelevision white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-ba
... Show More