This study examined the problematic of the ambiguous relationship between the media and terrorism and the problems that result from press coverage of terroristic incidents. The paper sought to show the classification and confrontation of such incidents had been established from the point of view of a sample of media professionals, researchers and writers who are frequenters of Al-Mutanabi Street in Baghdad. The media outlets that carry this coverage would not give up their media mission as well as the terrorists would not be given an opportunity to take advantage of this coverage in achieving their goals and objectives. Furthermore, the terrorist organizations would have no chance to exploit these means to deliver their terroristic message. The researcher prepared a scale including several phrases to reveal the limits of the ambiguous relationship between the media and terrorism and the resulting problems that harm the reputation of the media institution, the citizen, and the society.
This work aims to analyze and study the bit performance in directional oil wells which leads to get experience about the drilled area by monitoring bit performance and analyzing its work. This study is concerned with Rumaila Oil Field by studying directional hole of one oil well with different angles of inclination. Drilling program was used in order to compare with used parameters (WOB, RPM and FR).in those holes. The effect of the drilling hydraulic system on the bit performance was studied as well as the hydraulic calculation can be done by using Excel program. This study suggests method which is used to predict the value of penetration rate by studying different formation type to choose the best drilling parameters t
... Show MoreThe limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall
... Show MoreThe objective of drilling parameters optimization in Majnoon oilfield is to arrive for a methodology that considers the past drilling data for five directional wells at 35 degree of inclination as a baseline for new wells to be drilled. Also, to predicts drilling performance by selecting the applied drilling parameters generated the highest rate of penetration (ROP) at each section. The focal point of the optimization process is to reduce drilling time and associated cost per each well. The results of this study show that the maximum ROP could not be achieved without sufficient flow rate to cool and clean the bit in clay intervals (36" and 24") hole sections. Although the influence of combination of Weight on Bit (WOB), Round per mi
... Show MoreCreativity, imagination, and ingenuity are connected with instructing students in literary tasks. The purpose of the study is to determine what teaching activities are most Productive in helping students to comprehend literature. The research design used in the study is descriptive one. The researcher created a survey questionnaire that teachers could complete. It includes twelve learning activities related to teaching literature, such as: conceptual mapping of a poem, short story, or novel; observing and analyzing videos; collaborative discussions about the chosen text; and topical discussions with a partner ,composition of a poem ,analytic writings; playing a role; narrating stories with visual assistance, teacher-student exchanges; atten
... Show MoreInformation hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreSex chromatin (SC) is defined as inactive X chromosome in the female somatic cells, it condensed as heterochromatic at interphase of the nucleus and appears like nuclear satellite projection, and only female cells contain SC in mammals. Different ages of cocks: immature (8,16 weeks old), growing (24 weeks old) and production age (32,48 weeks old) , were studied to detect the sex chromatin (SC) with it's various shapes :Sessile nodule(SS), Drum stick(DS), Tear drop(TD) and Club shape(CS) in the blood lymphocytes of blood smears prepared from WBCs of 45 New Hampshire(NH) strain cocks. Also SC measurements were detected which include: vertical (V) and horizontal (H) axes, SC area (SCA), nuclear area (NA), and the
... Show MoreIn this paper we investigate the automatic recognition of emotion in text. We propose a new method for emotion recognition based on the PPM (PPM is short for Prediction by Partial Matching) character-based text compression scheme in order to recognize Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method is very effective when compared with traditional word-based text classification methods. We have also found that our method works best if the sizes of text in all classes used for training are similar, and that performance significantly improves with increased data.
Great authors have a reputation for being reluctant political allies. They adamantly insist on focusing on aspects of life that no ideologist ever bothers to address. Life never exactly conforms to doctrine, and their art appears to defy ideology completely or subversively in order to find methods to break free from its shackles. Woolf's attitude toward feminism provides readers with an essential example of this resistance. Though Virginia Woolf was extremely concerned about the difficulties of women, particularly literary women, she often disliked being associated with feminists. Instead, she pushes for the transcendence of sexual roles, urging readers to go beyond gender to gain a better knowledge of human existence. Woolf's thesi
... Show MoreIn this thesis, we study the topological structure in graph theory and various related results. Chapter one, contains fundamental concept of topology and basic definitions about near open sets and give an account of uncertainty rough sets theories also, we introduce the concepts of graph theory. Chapter two, deals with main concepts concerning topological structures using mixed degree systems in graph theory, which is M-space by using the mixed degree systems. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are defined and studied. In chapter three we study supra-approximation spaces using mixed degree systems and primary object in this chapter are two topological
... Show More