Preferred Language
Articles
/
abaa-36
Ways to face rumors in the social networking site Facebook: Research thesis from the PhD thesis
...Show More Authors

The research deals with the subject of «ways to face rumors in the site of social networking Facebook», a research based on a doctoral thesis, as the research dealt with rumors in the most dangerous type of new media, which sites of social communication with the global community as spreading rumors of all kinds and afflicts everyone who has eyes on him Of the audience of these sites, and aims to identify the rumors on Facebook because it is one of the most popular sites in the world and the strategy of combating the rumors published by Facebook users in their personal pages and groups that organize them, as well as identify methods and methods that can be During which the face of the rumors in the said site and eliminate them to the great danger to the safety and security and stability of Iraqi society.
The research is based on descriptive research and was based on a theoretical and practical framework through the design of the paper questionnaire to identify the views of the respondents about combating rumors in Iraqi society through axes prepared for this purpose. It also adopted a number of other research tools such as Arabic and translated books and books, scientific journals, studies and researches, A number of personal and public pages and groups on the Facebook site, and in order to verify the validity of the questionnaire and the validity of the categories and questions put in it has been used by the researcher a number of professors, academic arbitrators with experience .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 17 2019
Journal Name
Aip Conference Proceedings
The interpolation effect on the spare sinogram for 3D image reconstruction
...Show More Authors

The effect of using three different interpolation methods (nearest neighbour, linear and non-linear) on a 3D sinogram to restore the missing data due to using angular difference greater than 1° (considered as optimum 3D sinogram) is presented. Two reconstruction methods are adopted in this study, the back-projection method and Fourier slice theorem method, from the results the second reconstruction proven to be a promising reconstruction with the linear interpolation method when the angular difference is less than 20°.

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Nov 17 2021
Journal Name
International Journal Of Knowledge Management
Assessing the Success of the Perceived Usefulness for Knowledge Management Systems
...Show More Authors

Recently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and s

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Reflection Of The Financial Reporting Of Intellectual Capital Investment Decisions
...Show More Authors

Abstract

The intellectual capital an important variable in the equation of the success of seeking economic units to achieve a competitive advantage, since it is a real capital for economic unity it constitutes a strategic importance as the main source to achieve high profitability in the economic unit and highlights the importance of showing intellectual capital components of the main Represent of human capital and structural capital and relational capital, through effective and the prominent role played by intellectual capital within the economic unity in order to achieve a sustainable competitive advantage contribute to attracting investors with longer investment decision of the most important and difficult decisions ta

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Animal Health And Production
The Control and Preventative Measures for the Health Problems of Pets
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Evaluation The Performance Geodetic of the Receivers Using Static Positioning Technique
...Show More Authors

Global Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufactur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
The origins of the structure of nominative pronouns, a linguistic study
...Show More Authors

The Arabic pronouns received a lot of attention from the ancient Arab grammarians, so they explained their origins, the different forms of their structure, and the aspects of the Arabs’ use of them, and explained the aspects and reasons for these uses, with what they had of linguistic insight, which guided them to clarify the truth of these pronouns.
And recently, this research seeks new knowledge of the development of the structure of the nominative pronouns (he), (she), (them), (taa), and (waw) between dialects and towards classical Arabic, by analyzing the structure of these pronouns into their components. Its linguistic formulas are traced from the ancient Arabic texts, and by ancient I mean the texts of the era of linguistic ci

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
College Of Islamic Sciences
Weighting between the texts as the ruling when Imam Al-Salmi
...Show More Authors

abstract:

Objectives: The study aims to reveal the approach of Imam Al-Salmi in the weighting between the apparently conflicting texts, and to show the extent of his agreement and disagreement with the rest of the fundamentalists, and does he have vocabulary that can be used to elicit legal rulings in modern contemporary issues?

Method: The method of induction and analysis is one of the main tools to reach the research results. The study resorted to following the sayings of Imam Al-Salmi in various sources and fatwas and standing on them, then analyzing and applying them to the various branches of jurisprudence in the various jurisprudential chapters.

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
The International Scientific Conference For Nanotechnology And Advance Research’s
Effect of the annealing and compositional on the Morphological and electrical
...Show More Authors

Nanocrystalline TiO 2 and CuO doped TiO 2 thin films were successfully deposited on suitably cleaned glass substrate at constant room temperature and different concentrations of CuO (0.05,0.1,0.15,0.2) wt% using pulse laser deposition(PLD) technique at a constant deposition parameter such as : (pulse Nd:YAG laser with λ=1064 nm, constant energy 800 mJ, with repetition rate 6 Hz and No. of pulse (500). The films were annealed at different annealing temperatures 423K and 523 K. The effect of annealing on the morphological and electrical properties was studied. Surface morphology of the thin films has been studied by using atomic force microscopes which showed that the films have good crystalline and homogeneous surface. The Root M

... Show More
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The elements of the global tolerance and its impact on peace
...Show More Authors

The achievement of world peace is a humanitarian demand that humanity has sought since its existence. Despite the international and regional efforts to achieve this demand, it is still reaching its desired ambitions if conflicts, contradictions, and internal and external wars continue to justify us clearly in terms of ethnic, religious and sectarian conflict. The revolution of informatics and the impact of globalization opened a new era of communication and openness and the negative and positive impact of others, which re-published and distributed values, ideas and new cultures Some of them carries extremist ideas urging violence and destruction and other abolition, it became necessary to follow policies and reward The culture of peace,

... Show More
View Publication Preview PDF
Crossref