This study aimed to identify the political factors influencing the performance of specialized journalists in Iraqi electronic newspapers. The significance of the study stems from the role of communication in newspapers that have established themselves in reality due to their wide dissemination, multiple uses, expanding freedom base, and the current diversity in perspectives. These newspapers highlight and publish societal issues of concern. The importance of these newspapers is associated with their creators who face various factors affecting their value and performance, whether positively or negatively. In light of this, the political factor was identified as the primary driver for other influencing factors. The researcher employed a survey method to address the study's questions and objectives, targeting specialized journalists working in Iraqi electronic newspapers, amounting to 128 individuals from 27/9/2022 to 27/10/2023. The study took into account personal variables of the participants such as gender, age, and educational attainment. Several findings emerged from the study, including that 75% of males versus 25% of females work as specialized journalists. Moreover, personal inclination was found to be the strongest motivator for journalists, and there are notable impacts of political factors on the communicative competence of the specialized journalist.
Due to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and
... Show MoreThe Arab-Israeli conflict passed through several stages before reaching the final stage of normalization, namely conflict, conflict and public normalization. Thus, the UAE became the third country to establish official relations with Israel after Egypt in 1979 and Jordan in 1994. With the announcement of the normalization agreement, opinions varied between supporters and opponents of the idea of normalization with Israel, and some countries expressed their acceptance of establishing official relations between the Emirates and Israel, while others warned of the consequences of normalization, which they described as treachery. Although the UAE confirmed that the normalization agreement between the two sides was credited with stopping Israel's
... Show MoreThe aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
optical properties of pure poly(vinyl Alcohol) films and poly(vinyl Alcohol) doped with methyl red were study, different percentage prepared with constant thickness using casting technique. Absorption, Transmission spectra have been recorded in order to study the optical parameters such as absorption coefficient, energy gap, refractive index, Extinction coefficient and dispersion parameters were measured in the wavelength range (200-800)nm. This study reveals that the optical properties of PVA affect by increasing the impurity concentration.
The purpose of this study is to evaluate the hydraulic performance and efficiency of using direction diverting blocks, DDBs, fixed on the surface on an Ogee spillway in reducing the acceleration and dissipating the energy of the incoming supercritical flow. Fifteen types of DDB models were made from wood with a triangulate shape and different sizes were used. Investigation tests on pressure distribution at the DDBs boundaries were curried out to insure there is no negative pressures is developed that cause cavitation. In these tests, thirty six test runs were accomplished by using six types of blocks with the same size but differ in apex angle. Results of these test showed no negative pressures developed at the boundarie
... Show Moreيعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته م
... Show More
The Ash'aris and their position on faith, An Ideological Study
Omed AbdulQader rasool
College of Islamic Sciences/Salahaddin University-Erbil
Abstract
The concept of faith is very complex, and there are a lot of talk about it among the major Islamic groups such as the Kharijites, the Mu'tazila, the Jahmiyya and others, because of its great importance, and the worldly and eschatological effects it entails according to the elements of faith such as recognition, ratification and action.
The researcher chose one sect, which is the
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More