This research was conducted in order to monitor and measure the dimensions of media policy in satellite channels directed from the point of view of the communicator, and this research is classified among the descriptive studies, as the researcher used the survey method to answer the questions that were formulated in light of the research problem represented by the main question: What are the dimensions of media policy in Directed satellite channels? .
To achieve the objectives of the study, the researcher used the following tools:
The questionnaire, in order to survey the attitudes of communicators about the extent to which the media policy during crises reflects on their professional standards. The research community is represented in the international satellite channels speaking the Arabic language and destined for the Arab region. As for the research sample, the researcher chose the intentional sample method on two levels.
The first level: they are directed satellite channels licensed to operate in Iraq only, as there are seven directed channels.
As for the second level: they are those in charge of communicating with satellite channels working in Iraq only, their number reached (55) respondents.
One of the most important findings of the research was that the satellite channels directed clearly depend on the dimensions of the media policy through their adoption of the considerations of the legislative dimension, through that the most important forms imposed by the media policy in the satellite channels directed on the communicators is the category of commitment to (censorship laws) that outperformed all other categories. The research also showed that the majority of the respondents confirmed that the media policy of directed satellite channels constantly seeks to achieve the technological dimension through keeping pace with modern technology. This is evident from the keenness of the media policy of directed satellite channels in general to investigate the latest technological developments in the field of media
This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.
Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo
... Show MoreBP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More