Modern communication and media technology has pioneered new horizons and curried out deep changes in the various fields of social life, It effected enormously human communication as well.
Content one Who late the developments which have effected the social relations ،due to the new media ،especially Face book ,will certainly notice the far cry changes of the social relation net which has been effected ,in a way or another ،the accelerated development ،under the appearance of the so called the virtual society .
Face book has embodied the means – communication ,which has become an important turn point in the social communication .
It is the point the present paper tries to expose an discuss by a field study curried on a sample of the Iraqi capital ، Baghdad as this slice is the one that deals with Face book attentively ، and because Baghdad has mixed in repents all the components of the Iraqi society .
The objective reasons behind the subject of the study lies in the importance of its subject matter, a vital and modern one, in addition ,the studies which address the impact of new media, particularly Face book, and its effect on the Iraqi society .
While conservative access preparations could increase fracture resistance of endodontically treated teeth, it may influence the shape of the prepared root canal. The aim of this study was to compare the prepared canal transportation and centering ability after continuous rotation or reciprocation instrumentation in teeth accessed through traditional or conservative endodontic cavities by using cone-beam computed tomography (CBCT).
Forty extracted intact, matured, and 2-rooted human maxillary first premolars were selected for this
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreIn this paper we estimate the coefficients and scale parameter in linear regression model depending on the residuals are of type 1 of extreme value distribution for the largest values . This can be regard as an improvement for the studies with the smallest values . We study two estimation methods ( OLS & MLE ) where we resort to Newton – Raphson (NR) and Fisher Scoring methods to get MLE estimate because the difficulty of using the usual approach with MLE . The relative efficiency criterion is considered beside to the statistical inference procedures for the extreme value regression model of type 1 for largest values . Confidence interval , hypothesis testing for both scale parameter and regression coefficients
... Show MoreKarbala province regarded one part significant zones in Iraq and considered an economic resource of vegetation such as trees of fruits, sieve and other vegetation. This research aimed to utilize Normalized Difference Vegetation index (NDVI) and Subtracted (NDVI) for investigating the current vegetation cover at last four decay. The Normalized Difference Vegetation Index (NDVI) is the most extensively used satellite index of vegetation health and density. The primary goals of this research are gather a gathering of studied area (Karbala province) satellite images in sequence time for a similar region, these image captured by Landsat (TM 1985, TM 1995, ETM+ 2005 and Landsat 8 OLI (Operational Land Imager) 2015. Preprocessing such gap filli
... Show MoreNarrators who ruled Bukhari weak
In its great history, the small weak
And their strength Abu Hatim narrated by his son in his book wound and amendment
Coupling reaction of 2-amino benzoic acid with 8-hydroxy quinoline gave bidentate azo ligand. The prepared ligand has been identified by Microelemental Analysis,1HNMR,FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (ZnII,CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes have been characterized by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range
... Show MoreActivated carbon derived from Ficus Binjamina agro-waste synthesized by pyro carbonic acid microwave method and treated with silicon oxide (SiO2) was used to enhance the adsorption capability of the malachite green (MG) dye. Three factors of concentration of dye, time of mixing, and the amount of activated carbon with four levels were used to investigate their effect on the MG removal efficiency. The results show that 0.4 g/L dosage, 80 mg/L dye concentration, and 40 min adsorption duration were found as an optimum conditions for 99.13% removal efficiency. The results also reveal that Freundlich isotherm and the pseudo-second-order kinetic models were the best models to describe the equilibrium adsorption data.