This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in different ways, the most important of which are narrative texts supported by pictures that express the nature of the security event, and the respondents' preference for social networking sites in following up on press releases.
The Supreme Judicial Council decided on July 3, 2003, to set up a court to deal with the issues of publication and media. This court tries to solve the problems of media and publishing in both its civil and penal aspects. The decision of establishing the court represents a new and important step to be taken by the Iraqi Judicial Council for the tremendous development witnessed by media sector in general and press in particular especially after 2003.
This study includes two main axes: the first one deals with the most important crimes of publication in the Iraqi legislations such as the crimes of defamation, libel, insult, indecency, and incitement; the second deals with an analytical survey of the completed cases i.e. the issues tha
The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion sc
The purified frog skin peptides were tested on leukemic patients lymphocytes, which revealed effects of cytotoxicity. Four frogs (Rana ridibunda) were stimulated by single intra-peritoneal injection of norepinephrine-HCl . Five different peptides;1(18) A, 2(19) L, 3(20) I,4(21) E and 5(22) Y were isolated and quantified. The peptide 3(20)I had 5.87% of hemolysis, while healthy human lymphocytes cytotoxic activity was for 2(19)L with inhibition( -10.4%).All peptides were subjected to polyacrylamide gel electrophoresis. The results revealed peptides 1(18)A, 2(19)L, 3(20)I which appeared as low as 10 KDa marker. Theoretically, the whole polypeptide had a molecular weight 7488.61 Dalt
... Show MoreThe present study was conducted to determine the optimum conditions required for lipase enzyme activity extracted from germinated sunflower seeds, including temperature, pH, agitation, time of incubation, enzyme concentration, substrate type, and concentrations of mineral salts and EDTA. Optimum pH, temperature and time of incubation required for lipase stability were also determined. The results showede optimum lipase activity (3.251U/ml) wasund at 30 ÌŠC and pH 7 after 20 minutes of incubation when using 1 ml lipase enzyme with 0.02 ml of CaCl2 (10 mM) at 100 rpm of agitation and in the presence of olive oil as the substrate for enzyme reaction. EDTA appeared to have inhibitory effects, while Ca+2 and Mg+2 have stimulatory effec
... Show MoreMixed convection heat transfer in a vertical concentric annulus packed with a metallic porous media and heated at a constant heat flux is experimentally investigated with water as the working fluid. A series of experiments have been carried out with a Rayleigh number range from Ra=122418.92 to 372579.31 and Reynolds number that based on the particles diameter of Red=14.62, 19.48 and 24.36. Under steady state condition, the measured data were collected and analyzed. Results show that the wall surface temperatures are affected by the imposed heat flux variation and Reynolds number variation. The variation of the local heat transfer coefficient and the mean Nusselt number are presented and analyzed. An empirical
... Show MoreRecord, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).
Experimental activity coefficients at infinite dilution are particularly useful for calculating the parameters needed in an expression for the excess Gibbs energy. If reliable values of γ∞1 and γ∞2 are available, either from direct experiment or from a correlation, it is possible to predict the composition of the azeotrope and vapor-liquid equilibrium over the entire range of composition. These can be used to evaluate two adjustable constants in any desired expression for G E. In this study MOSCED model and SPACE model are two different methods were used to calculate γ∞1 and γ∞2
In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreDecision-makers in each country work to define a list of internal and external interests, goals and threats to their countries according to the nature of their awareness of these interests, goals and threats.
Hence, Iraq is not an exception to this rule, and the process of evaluating its interests and the objectives of its foreign policy is subject to the pattern of awareness of decision-makers and the influencing forces in defining its basic interests, which often witness some kind of difference in defining them, evaluating their importance and determining the size of the threats they face. And among these interests and threats that have witnessed a difference in the assessment of their
... Show More