The role of Iraqi newspapers in instilling political culture among the public after 2003, a field study on the audience of the city of Baghdad, University of Baghdad, College of Information, Department of Journalism, 2019,
The problem of research is to investigate the role of Iraqi newspapers in instilling the political culture of individuals after 2003, and monitor this role Through the contents and messages provided by the Iraqi newspapers to the public. the research is classified within descriptive research, it adopts the survey methodology and used the questionnaire tool. In fact, the questionnaire was distributed to a sample of 400 individuals that was selected according to the method of multi-stage cluster sample of those who read the Iraqi newspapers in paper and electronic format.
The research reached a number of results, most notably:
1) Concerning the research on the concept of political culture from the viewpoint of the respondents: "the development of political awareness in all political" ranked first with (37.3%), followed by "the process of political participation in various
2) The results of the research indicate that the overall average of the degree of knowledge achieved by reading the Iraqi newspapers was (2.45) and (61.2%) .
3) The largest number of respondents confirmed that the most prominent political information and knowledge covered by the Iraqi newspapers is "political knowledge regarding the daily events of the country" as reached 27.4%.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreBackground: One of the more significant hormonal systems, the renin-angiotensin-aldosterone system, controls the kidney function, adrenal gland through its effect on the balance of sodium and potassium, blood pressure, fluid volume, and also manages the functions of cardiovascular. Objective: To clarify the interrelationship between renal dysfunction and renin-angiotensin-aldosterone system. Patients and Methods: One hundred samples were collected from December 1, 2022, to February 18, 2023, from Al Shams Medical Laboratories (56 male, and 44) female, age range (of 45-60 years), all of them were volunteers suffering from chronic renal failure in the third stage the average glomerular filtration rate was 35. 70 ± 0.37 12
... Show MoreThe process involved isolating E. faecium from the gut of honeybees, screening the bacterium for bacteriocin-like inhibitory substance (BLIS), evaluating its impact on the expression of the mexA gene in multidrug-resistant (MDR) P. aeruginosa, and determining the role of bacteriocin in treating infected wounds in mice through histopathological examination. After evaluating the best circumstances for producing BLIS, it was discovered that glucose was a superior carbon source and yeast extract was the best source of nitrogen. The pH was found to be 5, the ideal incubation time was 72 hours, and ammonium sulfate salt was used for partial purification at 80% saturation. The identification of MDR P. aeruginosa isolates from pus infection
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreBackground: Biologically active substances, such as Cathepsin B (CAB) which is a lysosomalcystein protease may be involved in periodontal metabolism in the degradation of organic bone matrix containing collagen fibers in response to mechanical stress from orthodontic appliance. The aims of study were to determine and compare salivary levels of CAB, pH as well as clinical periodontal parameters (Plaque index PLI and gingival index GI) with different orthodontic force magnitudes at different time intervals. Materials and methods: A twenty-four patients (both gender) with age range (17-23) years had Angle's Class II division 1 malocclusion with GI >0.5 enrolled in this study. The level of salivary CAB and pH, in addition to the clinical period
... Show MoreAW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 3