|
The problem of research on the study of political debate programs in the Iraqi satellite channels, in the "People decide" program by Afaq channel and " electoral competition " by Fallujah channel), and its importance for the community and researchers in the scientific field, as new programs to enter the Iraqi media after we have been the world media a lot in this area at the academic and practical levels (The field), and seeks to find out what the technical construction of the programs of political debates in Iraqi satellite channels and methods of construction and methods of employment used by the technical elements in the presentation of the programs and The study adopted the survey method and the method of analyzing the content which is one of the most appropriate methods of analysis for this research, and the researcher sought to survey the methodological analysis of the two programs,( The people decide in Afaq Channel and an electoral competition in the Fallujah channel ( The researcher chose two programs, The people decide in Afaq channel and an electoral competition in the Fallujah channel.), a sample of the research and set the time period in a comprehensive inventory of all the items of the research sample from 24/3/2018 to 10/5/2018 by 14), A program for (people decide) and from 1/4/2018 until 10/5/2018 with 36 episodes of the program (electoral competition). The research article was in (50) Fifty episodes political debate programs in both channels. |
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreThis research aims at analysing epitaphs written by Thomas Moore for the memory of Rupert Southey, the epitaph is analysed linguistically and stylistically on four levels graphology, phonology, morphology, and lexico-syntax level to explore the elements that the writer uses the most at each level. Bearing in mind Nowottny approach (1962) (to text analysis) who believes that the linguistic analysis of a literary text is not just a marginal but a necessity” (Bakuuro etal., 2018:34). The researcher has selected and analysed a written epitaph of famous individual associated with English, literature. The study involves both literary and linguistic analysis, with much more concentration through the analysis on the aspect of linguistics. In fact
... Show More500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met
... Show MoreIn this paper, there are two main objectives. The first objective is to study the relationship between the density property and some modules in detail, for instance; semisimple and divisible modules. The Addition complement has a good relationship with the density property of the modules as this importance is highlighted by any submodule N of M has an addition complement with Rad(M)=0. The second objective is to clarify the relationship between the density property and the essential submodules with some examples. As an example of this relationship, we studied the torsion-free module and its relationship with the essential submodules in module M.
Media has become a common platform for communication as a tool of offense. English language has many insult words which are commonly used in the world of media. This study investigates the socio-pragmatic aspect of insulting in English news. It aims at identifying and analysing insult words and expressions used by news presenters. To specify the problem of the study, language has a harmful power that hurts the addressees and seriously harm their psychological well-being. The insulting words that are an element of all human languages are the source of this abusive power. The study questions sought to find out are if news presenters use insult words, which insult words, and in what social contexts. In this study, the descriptive method is use
... Show MoreBN Rashid…, Special Education, 2022
The research aims to identify the digital repository of the University of Baghdad, explain its features, how to register, explaining the mechanism for adding and retrieving research. In addition to identifying the number of people registered in and the number of intellectual outputs stored in it. The descriptive approach and survey methods were adopted by visiting the repository's website and the websites of the University of Baghdad's formations during the period (1-6/4/2024). The theoretical framework included an explanation of the concept of the digital repository, the importance of repositories, their features, and types, with reference to models of Iraqi, Arab, and foreign university digital repositories. The practical framework of the
... Show More