Preferred Language
Articles
/
abaa-241
Viewing television in media convergence era Rites change and practices transformation
...Show More Authors


The present article concerns one of the objects of media sociology under construction. The transformation of the rites in the use of the television contents in the era of digital technologies and media convergence. By an analytic contextual approach, based on the study of the uses, we formulate the following hypothesis: so many changes in the rites of uses are real, in particular at the young people, so, many pieces integer of the everyday life remain impervious to these changes, and it is true under the influence of a slowness of the social and cultural orders, rooted for a long time in the traditional social fabric. We shall then try to bring a sociological look to this societal, cultural, and communicational object that is the passage of the reception television contents in the various digital platforms. This passage stands out nevertheless, a transformation in the media: the passage from the collective viewing in family to the personalized individual viewing.
Sociological dimension which underlies this transformation has for consequence the dismantling of the temporal structure of the consumption, by giving the possibility to the users to reorganize the television appointment, and to release them at the same time from the domestic space, the place where the practices are applies the social control by
means of the interactions public television.
« Old media are not beingdisplaced .Rather, their functions and statuses are shifted by the introduction of new technology.”(Jenkins, 2006)

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Double Stage Shrinkage Estimator For the Variance of Normal Distribution With Unknown Mean
...Show More Authors

     This paper is concerned with preliminary test double stage shrinkage estimators to estimate the variance (s2) of normal distribution when a prior estimate  of the actual value (s2) is a available when the mean is unknown  , using specifying shrinkage weight factors y(×) in addition to pre-test region (R).

      Expressions for the Bias, Mean squared error [MSE (×)], Relative Efficiency [R.EFF (×)], Expected sample size [E(n/s2)] and percentage of overall sample saved of proposed estimator were derived. Numerical results (using MathCAD program) and conclusions are drawn about selection of different constants including in the me

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 04 2023
Journal Name
Baghdad Science Journal
Generalised Henstock - Kurzweil Integral with Multiple Point
...Show More Authors

This paper deals with a new Henstock-Kurzweil integral in Banach Space with Bilinear triple n-tuple and integrator function Ψ which depends on multiple points in partition. Finally, exhibit standard results of Generalized Henstock - Kurzweil integral in the theory of integration.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Agricultural And Statistical Sciences
A COMPARISON BETWEEN SOME HIERARCHICAL CLUSTERING TECHNIQUES
...Show More Authors

In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.

Preview PDF
Scopus (1)
Scopus
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Educational Thought of the Chief Justice Badr Al-Din Ibn- Jamaah
...Show More Authors

The ideas and principles formulated by Ibn-Jamaah in the field of education occupy a central place in the historical origins of education for Muslims. These views and principles have an active role in the educational reorganization that the Islamic world aspires to. These ideas have had a great impact on the educational process that had preceded the opinions of Russo, Pestalutzi, Fruel, Herbert, and Dewey. Moreover, we have seen that the Sheikh of Ibn-Jamaah has taken part in formulating the origins of education and leadership.

View Publication Preview PDF
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
الدوریـات الطبیّة العربیّة الإلكترونیّة دراسـة تقویمیـة
...Show More Authors

Objective: The aims of research to identify sample of websites of Arabian medical periodicals and exam applying to
standards for publishing on the internet.
Methodology: A survey method is applied about nine medical periodicals websites and data are collected through
forms include five international standards to assessing websites.
Results: of data collected, the following findings are obtained:
1. Through examining website addresses, unsuitability was found in using Universal Resources Locater, because six of
periodicals use com. in URL. While, all of them not relevance commercial but scientific aim.
2. To measure Credibility Standard by adopting numbers values, the results found, four of periodicals obtained (level

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 22 2024
Journal Name
Iraqi Statisticians Journal
Inferential Methods for the Dagum Regression Model
...Show More Authors

The Dagum Regression Model, introduced to address limitations in traditional econometric models, provides enhanced flexibility for analyzing data characterized by heavy tails and asymmetry, which is common in income and wealth distributions. This paper develops and applies the Dagum model, demonstrating its advantages over other distributions such as the Log-Normal and Gamma distributions. The model's parameters are estimated using Maximum Likelihood Estimation (MLE) and the Method of Moments (MoM). A simulation study evaluates both methods' performance across various sample sizes, showing that MoM tends to offer more robust and precise estimates, particularly in small samples. These findings provide valuable insights into the ana

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Soc-Semi-Prime Sub-Modules
...Show More Authors

     In this paper, we study a new concept of fuzzy sub-module, called  fuzzy socle semi-prime sub-module that is a generalization the concept of semi-prime fuzzy sub-module and fuzzy of approximately semi-prime sub-module in the ordinary sense.  This leads us to introduce level property which studies the relation between the ordinary and fuzzy sense of approximately semi-prime sub-module. Also, some of its characteristics and notions such as the intersection, image and external direct sum of fuzzy socle semi-prime sub-modules are introduced. Furthermore, the relation between the fuzzy socle semi-prime sub-module and other types of fuzzy sub-module presented.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn: 1683 - 3597 , E-issn : 2521 - 3512)
Evaluating the Clinical Outcomes of Three Medication Regimens for Treating a Sample of Iraqi Persistent Asthmatic patients
...Show More Authors

Abstract     Asthma is a complex disease defined by chronic airway inflammation and airflow limitation causing variable respiratory symptoms which include shortness of breath (SOB), wheezing, chest tightness and cough. Asthma guidelines advocate adding a second long acting bronchodilator to medium doses of inhaled corticosteroids (ICS) rather using high doses of ICS alone to control moderate to severe persistent asthma. The aim of this study was to evaluate the clinical outcomes of three medication regimens indicated for Iraqi patients suffering from persistent asthma.      This study was interventional randomized clinical study conducted on a sample of adult Iraqi asthmatic patients in Baghdad City. The study com

... Show More
Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 10 2025
Journal Name
Journal Of University Of Anbar For Pure Science (juaps)
Evaluation the Initial Values for Eccentric Anomaly for an Ellipse Orbit: Article Review
...Show More Authors

The equation of Kepler is used to solve different problems associated with celestial mechanics and the dynamics of the orbit. It is an exact explanation for the movement of any two bodies in space under the effect of gravity. This equation represents the body in space in terms of polar coordinates; thus, it can also specify the time required for the body to complete its period along the orbit around another body. This paper is a review for previously published papers related to solve Kepler’s equation and eccentric anomaly. It aims to collect and assess changed iterative initial values for eccentric anomaly for forty previous years. Those initial values are tested to select the finest one based on the number of iterations, as well as the

... Show More
View Publication