The paper aims to reveal the effectiveness of digital journalism in developing political awareness among Iraqi feminist activists. This paper is descriptive, and it adopted the analytical descriptive survey method. A snowball sample composed of (102) respondents of Iraqi feminist activists was adopted and questionnaire was used to collect data. The research has reached the following conclusions: The rate of Iraqi Feminist Activists dependence on digital Journalism have increased; to develop their political awareness, and their preference - in this regard - (the pages of journalistic institutions to social media) in a way that exceeds other types of digital journalism. (Variety of languages) has topped the priorities of Iraqi feminist activists regarding the richness of digital journalism they depend on; to develop their political awareness. No statistically significant differences were found among Iraqi feminist activists based on their demographic variables and their priorities regarding the richness of digital journalism they depend on; to develop their political awareness. A positive and strong significantly statistical relationship was found between the effectiveness of digital journalism represented by its cognitive, emotional, and behavioral effects related to the political awareness of Iraqi feminist activists, and their priorities regarding the richness of that journalism.
Background: Facial disfigurement can be the result of a congenital anomaly, trauma or tumor surgery, in many cases the prosthetic rehabilitation is indicated. Maxillofacial prosthetic materials should have desirable and ideal physical, aesthetic, and biological properties and those properties should be kept for long period of time in order to reach patient acceptance. Silicone elastomer are the most commonly used material for facial restoration because of its favorable properties mechanically and physically as the biocompatibility and good elasticity. Aim of this study: This study aimed to evaluate the effect of addition of Aluminum oxide (Al2O3) Nano fillers in different concentrations on tear strength and hardness of VST 50F room tempe
... Show MoreThis study outlines the synthesis of substituted 1,2,4-triazole derivatives through the cyclization reaction of thiourea derivatives. The process begins with the reaction of different halides with KSCN to produce isothiocyanate derivatives. then followed by a reaction with isonicotinic acid hydrazide to yield thioureas (1-6), with a yield rate of (72-88%). Then, compounds (1-6) were treated with alkaline medium 4 N (NaOH) to produced 1,2,4-triazole derivatives (7-12) with a yield (51-69%).The structure of the prepared compounds was characterized using FTIR,1HNMR and 13CNMR spectroscopy. Some of the synthesized compounds were tested for antimicrobial activity when, compound 9 showed strong activity against gram positive bacteria (Sta
... Show MoreThe aim of this research is to apply the concept of total value management to improve the process design of producing the toothpaste in Al Mammon factory one of the in the general company of food industry. The concept of total value management is concerning with achieve more than one values which are important for the customers as these values are related to the customers satisfaction. The research problem is that the factory did not measure the effectiveness of process design as this company has weakness in analyzing this effectiveness in synchronies with total value management. On the other side, the company did not give more attention to the cost of products and selling prices within the value cost/ profit which is one of the
... Show More
Diazotization reaction between quinolin-2-ol and (2-chloro-1-(4-(N-(5-methylisoxazol-3-yl)sulfamoyl)phenyl)-2l4-diazyn-1-ium was carried out resulting in ligand-HL, this in turn reacted with the next metal ions (Ni2+, Pt4+, Pd2+, and Mn2+) forming stable complexes with unique geometries such as (tetrahedral for both Ni2+ and Mn2+, octahedral for Pt4+ and square planer for Pd2+ ). The creation of such complexes was detected by employing spectroscopic means involving ultraviolet-visible which proved the obtained geometries, fourier transfer proved the formation of azo group and the coordination with metal ion through it. Pyrolysis (TGA &
... Show More. In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction a
... Show MoreTesting is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evalua
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.