The objectives of this study revolve around identifying the extent of funding impact on the future of the printed Iraqi press, and whether it threatens their chances of survival, stating the extent of technological development on the income of the printed newspaper, and identifying the causes of the financial crisis on the newspaper.
This research is classified as descriptive research, and the researcher used the survey method, and adopted the questionnaire of the views of the contactors, in five Iraqi newspapers (morning - extent - time - the way of the people - the call).
The research community included (68) respondents, whereby the comprehensive inventory method was used to define the research community, and the researcher used to collect information research tools (questionnaire form) and (source interview).
The research reached a number of conclusions, the most important of which are:
1- Most of the printed press organizations suffer from financing problems, and the volume of funding.
Not compatible with the cost of issuing a single issue.
2- The financial crisis experienced by the press as a result of lack of funding and the absence of advertisements, in addition to the lack of distribution of newspaper copies and the emergence of the electronic press.
3- Most of the press organizations have dismissed a number of journalists to face the financial crisis they are facing.
4- Newspapers do not adopt an independent policy without the influence of the funding agency in processing the news.
5-There are indicators for dispensing paper publications and restricting them to digital copies.
Materials with external dimensions of one or more nanometers are referred to as nanomaterials. These structures result from a number of manufacturing processes. They are used in many industries, including pharmaceuticals, which is the most significant one. Numerous variables, including size, shape, surface morphology, crystallinity, solubility, etc., affect physical properties. While new physical and chemical processes are being created constantly, the biological method is the ideal strategy for synthesizing nanoparticles since it is straightforward, safe, and economical. Different kinds of nanoparticles can be metabolically synthesized by a wide variety of biological sources, including plants, bacteria, fungi, and yeast. There are
... Show MoreThis study highlights the social concepts of the ‘night’ of the residents of Mesopotamia, who realized the nature of the universe, constellations, planets, stars, and the sun and the moon and their effect on the daily life. Moreover, they recognized the requirements of the day and the aspects of the night that impacted their life in one way or another. Through the cuneiform regarding day and night, we found that people had their special view concerning ‘night’ in terms of religious and secular dimensions. They had benefited from the appearance of stars and the moon and had related many events – social, religious, or military – to these phenomena. I chose to do this study in relation to ‘night’ due to its importance in the th
... Show MoreIn this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreA novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)
Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreAbstract
This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per
... Show MoreAbstract:
Objective: To know the effect of televised media violence on the relationship of Children's primary school with mates and identify association between the demographic characteristics and socioeconomic status for primary school children and their relation with exposure to televised violence media.
Methodology: simple probability sample of 221 children were selected from 1425 children are learning in schools in Al-Nasiriyah City.
Results: Results of the current study showed that (53.8%) of children exposed to Televised media violence be relationship with their mates weak, (46.2%) of them have their relationship with their mates good, as well as the study showed that the presence significant correlation with males genders
