This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in different ways, the most important of which are narrative texts supported by pictures that express the nature of the security event, and the respondents' preference for social networking sites in following up on press releases.
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreMost of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show More
The research problem lies in the lack of accurate scientific perceptions concerning the reality of the communicator and the factors influencing his job. The research is aimed at introducing the communicator in the university press, clarifying the obstacles facing him, and uncovering the level of his job satisfaction and his visions of developing his work. The researcher adopted the survey method in the collection, analysis, and interpretation of the data using a questionnaire. A set of results and conclusions has been reached, most importantly are:
*The communicator performs multiple missions including writing, editing, and collecting info |
This work aims to show the nature of the relationship between management by walking around (the independent variable) and strategic renewal (the dependent variable), as well as it shows the effect of the independent variable on the dependent variable. Questionnaire items were considered the main tool for data collection by three basic aspects. The first involved the personal data of the respondents, while the second included items related to management by walking in five dimensions, and the third is strategic renewal items by addressing four dimensions. The tourism sector, while the community has six Excellent grade hotels was taken into account in this wor
... Show MoreThe electrode in the microbial fuel cell has a significant effect on cell performance. The treatment of the electrode is a crucial step to make the electrode surface more habitable for bacteria growth, thus, increases the power production as well as waste treatment. In the current study, two graphite electrodes were treated by a microwave. The first electrode was treated with 100W microwave energy, while the second one was treated with 600W microwave energy. There is a significant enhancement in the surface of the graphite anode after the pretreatment process. The results show an increase in the power density from 10 mW/m2 to 15 mW/m2 with 100w treatment and to 13.47 mW/m2 with 600w treatment. An organic
... Show MoreThis research was dealing with the aesthetic impact of encryption in form and content and aesthetic implications in the design of contemporary fabrics. That's where the design of the cloth is linked to the continuous development and continuous innovation and the pursuit of the all-new innovative designs and at the same time an unmarked Cryptographic with semantics and symbols reflect reality aesthetically pleasing and contains four chapters on the research :The first chapter discusses the research problem and its significance is the current quest ( encryption in form and content in contemporary designs fabrics and aesthetic implications ) in that it shows the importance of encryption in the design of fabrics and foundation design configu
... Show MoreAbstract
The research attempted to find an explanation and solution to a problem related to the fluctuation and decrease In the rate of return on assets for the research sample banks during the duration of the research, The search started from the hypothesis that, The effect of salary Domiciliation on the banking profitability of a sample of Iraqi banks participating in the salary settlement system for the period (2016-2019),The research used the descriptive historical approach, the quantitative analytical approach and the statistical approach. The research reached a set of conclusions, the most important of which is The effect of salary Domiciliation on banking profitability was achieved in three banks
... Show More