This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in different ways, the most important of which are narrative texts supported by pictures that express the nature of the security event, and the respondents' preference for social networking sites in following up on press releases.
Objective: This in vitro study is aimed to compare and evaluate the cyclic fatigue of four varying NiTi rotary instrumentation systems. Method: In this study, four types of rotary files were used in four groups (10 files for each group), namely, Group A: Wave One Gold; Group B: AF Blue R3; Group C: One Curve; Group D: F6 SkyTaper. These groups were evaluated by a cyclic fatigue apparatus to measure cyclic fatigue resistance within the artificial metallic simulating canal that has a 60 angle of curvature, the curvature radius was 5 mm, whereas the inner diameter of the canal was 1.5 mm. All the files were rotated in artificial canals until they fracture. The resistance to cyclic fatigue was determined by counting the number of cycles to frac
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreA field experiment was conducted in Yusufiya sub-district - Mahmudiya township/Baghdad governorate in silty loam texture soil during the spring season of 2020. The experiment included three treatments with three replicates, as the Randomized Complete Block Design (RCBD) was used according to the arrangement of the split design block. The treatments are in the irrigation system, which included surface drip irrigation (T1) and sprinkler irrigation (T2). Secondly, the Irrigation levels including the irrigation using 0.70 Pan Evaporation Fraction PEF (I1), irrigation using 1.00 PEF (I2), and irrigation using 1.30 PEF (I3). Coupled with, Pota
... Show MoreIn the drilling and production operations, the effectiveness of cementing jobs is crucial for efficient progress. The compressive strength of oil well cement is a key characteristic that reflects its ability to withstand forceful conditions over time. This study evaluates and improves the compressive strength and thickening time of Iraqi oil well cement class G from Babylon cement factory using two types of additives (Nano Alumina and Synthetic Fiber) to comply with the American Petroleum Institute (API) specifications. The additives were used in different proportions, and a set of samples was prepared under different conditions. Compressive strength and thickening time measurements were taken under different conditions. The amoun
... Show MoreTwo series of 1,3,4-oxadiazole derivatives at the sixth position of the 2,4-di-