Preferred Language
Articles
/
abaa-411
EMPLOYING TWITTER IN THE U.S. PRESIDENTIAL ELECTION CAMPAIGN IN 2016: U.S. PRESIDENTIAL CANDIDATE DONALD TRUMP’S TWEETS AS A “MODEL”: (A Research Drawn from a Master’s Thesis) (An Analytical Study)
...Show More Authors

This study aimed to identify the employment of the social networking platform «Twitter» in the 2016 presidential campaign led by the Republican candidate, Donald Trump; and analyse his tweets through his personal account on «Twitter»  for the period from: 10/ 8/2016 to: 11/ 8/2016 which represents the last month of the election campaign.

The study belongs to the type of descriptive studies using the analytical method through an analysis index that includes sub-categories and other secondary categories. The research has adopted the ordinary unit of information material (tweet) as an analysis unit for this purpose.

The validity of the tool was verified by a precise definition of the units of analysis and the analysis tool was presented to a group of experts for arbitration. The Holistic Equation was, in addition, used to verify the reliability of the analysis tool.

The results showed that the field of elections is the most focused area on which President Trump focused. The domestic policy issues came second, while the content of encouraging participation in the elections came out the contents covered by the tweets. Accusations of corruption by Trump against his Democratic opponent, Hillary Clinton, came second in the category of contents.

As for the targeted parties, the study showed that the American voters are the most targeted group followed by the personality of Hillary Clinton. In the category of techniques, it appeared that the technique of encouragement is the most used. Then, it was followed by the technique of criticism. As for the means of support, it was noted that the most used was the image, then the websites link.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Formulas The command and its style in Surat Al-Ma’idah is a rhetorical fundamentalist study.: The command and its style in Surat Al-Ma’idah is a rhetorical fundamentalist study
...Show More Authors

Research Summary :

      Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:

     This is a brief research that contained its two rudders the command and its Style in Surat Al-Ma’idah a fundamental rhetorical study, and the study clarified the meaning of imperative in both;  the Arabic  language and in the terminology of the fundamentalists and rhetoricians in a concise manner, and then indicated the imperative of the command , the true meaning, and the meanings interpretated as an  imperative form. I have mentioned some verses of Surat Al-Ma’idah, so what I have quot

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
A Competitive Study Using UV and Ozone with H2O2 in Treatment of Oily Wastewater
...Show More Authors

          In this study, ultraviolet (UV), ozone techniques with hydrogen peroxide oxidant were used to treat the wastewater which is produced from South Baghdad Power Station using lab-scale system. From UV-H2O2 experiments, it was shown that the optimum exposure time was 80 min. At this time, the highest removal percentages of oil, COD, and TOC were 84.69 %, 56.33 % and 50 % respectively. Effect of pH on the contaminants removing was studied in the range of (2-12). The best oil, COD, and TOC removal percentages (69.38 %, 70 % and 52 %) using H2O2/UV were at pH=12. H2O2/ozone experiments exhibited better performance compared to

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Factors associated with the phenomenon of marriage outside the court And the consequences of it A field study in Sadr City
...Show More Authors

Marriage outside the court is a manifestation of the oppression that women are subjected to in Iraq its seriousness comes out of the consequences that it leads to The. It overlooks the age of the girl and her marriage in younger age or coerced to marry as it leads to neglecting the affordability of marital relationship as long as the marriage does not have any legal or material consequences. The present study aims to detect Characteristics of both wives, husbands and families Who agree to marry her daughters outside the court. And the reasons that lead them to marry outside the courts. It also aims to provide information on the circumstances of marriage and reasons for refusing to ratify it in court. The study was based on the sample soc

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Bionatura
A comparison of VCAM-1 and ICAM-1 as atherosclerosis risk factors in patients with systemic lupus erythematosus from Iraq
...Show More Authors

All major organs may be impacted by the connective disease systemic lupus erythematosus, a separate risk factor for coronary artery disease (CAD). Adhesion molecules like intercellular adhesion molecules (ICAM) and vascular cell adhesion molecules (VCAM) can detect endothelial damage and dysfunction, which appear to play a crucial role. This study investigated whether people with SLE had elevated subclinical and clinical atherosclerosis risk factors. Traditional CAD risk factors such as smoking, hypertension, and hyperlipidemia cannot entirely explain this elevation. It is thought that immunological dysfunction also increases CAD risk in SLE patients. The study aimed to assess early endothelial changes in SLE Iraqi female patients w

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
Religious references to art of miniatures In the Iranian school (Behzad is a model): عبدالرزاق جبار رحيل
...Show More Authors

The study examines the religious references of the art of miniatures in the Iranian school "Bahzad model" completed in Iran during the twelfth century AH, according to the controls and characteristics of the authoritative references. The researcher presented the problem of research, its importance, the need for it and its purpose, defined the terms in the research. The theoretical framework came with three investigations. The first topic of the concept of the reference in the field of knowledge, which concluded the most important features of the reference, is that each symbolic existence corresponds to a real existence and symbolic presence is an input to the realization of the reference. The reference then becomes a sign that acts as a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Ain Shams Engineering Journal
A semi-analytical iterative method for solving differential algebraic equations
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Expressive Topics in Plastic Art Achievement A comparative study between Gustav Klimt and Star Kauusch
...Show More Authors

 Schools and artistic trends derive their themes from artistic styles and styles as methods followed by the artist to express his themes embodied in the values of artistic and plastic elements as symbols and signs that can be described according to the type of art school and the extent to which the artist is influenced in employing them as a goal to achieve the plastic achievement in the painting, and from those vocabulary (human beings nature Life) as encoded messages that have an appearance and an interior, the appearance of which are forms, colors, formats and distributions of space and their interior meanings and semantics embody attitudes, events and circumstances that stem from the social depth and daily life and derive their comp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
An analytical study of the spread patterns of the informal settlements in Baghdad and sustainable urban improvement approaches
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
An Integrated Information Gain with A Black Hole Algorithm for Feature Selection: A Case Study of E-mail Spam Filtering
...Show More Authors

     The current issues in spam email detection systems are directly related to spam email classification's low accuracy and feature selection's high dimensionality. However, in machine learning (ML), feature selection (FS) as a global optimization strategy reduces data redundancy and produces a collection of precise and acceptable outcomes. A black hole algorithm-based FS algorithm is suggested in this paper for reducing the dimensionality of features and improving the accuracy of spam email classification. Each star's features are represented in binary form, with the features being transformed to binary using a sigmoid function. The proposed Binary Black Hole Algorithm (BBH) searches the feature space for the best feature subsets,

... Show More
View Publication Preview PDF
Scopus Crossref