Information pollution is regarded as a big problem facing journalists working in the editing section, whereby journalistic materials face such pollution through their way across the editing pyramid. This research is an attempt to define the concept of journalistic information pollution, and what are the causes and sources of this pollution. The research applied the descriptive research method to achieve its objectives. A questionnaire was used to collect data. The findings indicate that journalists are aware of the existence of information pollution in journalism, and this pollution has its causes and resources.
Non uniform channelization is a crucial task in cognitive radio receivers for obtaining separate channels from the digitized wideband input signal at different intervals of time. The two main requirements in the channelizer are reconfigurability and low complexity. In this paper, a reconfigurable architecture based on a combination of Improved Coefficient Decimation Method (ICDM) and Coefficient Interpolation Method (CIM) is proposed. The proposed Hybrid Coefficient Decimation-Interpolation Method (HCDIM) based filter bank (FB) is able to realize the same number of channels realized using (ICDM) but with a maximum decimation factor divided by the interpolation factor (L), which leads to less deterioration in stop band at
... Show MoreIn this paper, an algorithm is suggested to train a single layer feedforward neural network to function as a heteroassociative memory. This algorithm enhances the ability of the memory to recall the stored patterns when partially described noisy inputs patterns are presented. The algorithm relies on adapting the standard delta rule by introducing new terms, first order term and second order term to it. Results show that the heteroassociative neural network trained with this algorithm perfectly recalls the desired stored pattern when 1.6% and 3.2% special partially described noisy inputs patterns are presented.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThe increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from bot
... Show MoreThe study of the laptop computer table is one of the important studies at the present time due to the importance of electronic computers that are used in work sites and homes for very long hours, so one of the most important basics of caring for the comfort of the user lies in the design of the laptop table in different shapes and sizes and multiple functions in addition to calculating the measurements of the human body and the extent Its compatibility with the design and measurements of laptop computer tables by taking into account the calculations and measurements of the dimensions of the user's body of all ages and their consistency and use with the general measurements of the tables and the importance of research comes through the es
... Show MoreNicotiana tobaccum L (Solanacea) extracts are used as a mollusciede to the snail Bulinus truncatus the intermediate host of urinary Schistosomiasis. LC50 of the extracts to the snail with 24 hour was 3.27 ml/l? 48 hour was 3.33 ml/l? 72 hour was 2.67 ml/l and 96 hour was 2.28ml/l. This study showed the ability to use the leaf extracts in the control of this type of snail.
This paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT), (median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Lap
Isolated Bacteria from the roots of barley were studied; two stages of processes Isolated and screening were applied in order to nd the best bacteria to remove kerosene from soil. The acve bacteria are isolated for kerosene degradaon process. It has been found that Klebsiella pneumoniae sp. have the highest kerosene degradaon which is 88.5%. The opmum condions of kerosene degradaon by Klebsiella pneumonia sp. are pH5, 48hr incubaon period, 35°C temperature and 10000ppm the best kerosene concentraon. The results 10000ppm showed that the maximum kerosene degradaon can reach 99.58% aer 48 h of incubaon. Higher Kerosene degradaon which was 99.83% was obtained at pH5. Kerosene degradaon was found
... Show More