Preferred Language
Articles
/
abaa-954
Media policy and its impact on the level of objectivity in the Iraqi media : A study from the communicators’ point of view in the Iraqi medi outlets for the period from (1/5/2021 to 1/9/2021)
...Show More Authors

The research aims to reveal the impact of media policy in Iraqi media outlets on the level of objectivity in these outlets. A study from the communicators’ point of view where the researcher used a survey method on the communicators in media outlets to reveal the extent of media policies knowledge as well as the pressures exerted by this policy on communicators in media outlets. It also reveals the extent of their commitment to objectivity, neutrality in dealing with information and the way used to transfer it.
The research sample included (179) respondents from communicators in a range of Media outlets such as (Press, Radio, and Television), The researcher was careful with the diversity of the sample, and the targeted media outlets. The research found that the majority of respondents have knowledge of the media outlets’ policies and agree with them. It put pressure on them in terms of objectivity, since most of them were warned as a result of covering topics neutrally and objectively. Results also indicate that they alternatively use social media as a broader range of freedoms.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Mechanical Properties of MIG Joints for Dissimilar Aluminum Alloys
...Show More Authors

The research aims to investigate the effects of GMAW or MIG welding process on the mechanical properties of dissimilar aluminum alloys 2024-T351 and AA 6061- T651. A series of experimental techniques have been conducted to evaluate mechanical properties of the alloys, by carrying out hardness, tensile and bending tests for welded and un-welded specimens.

Metal inert gas (MIG) has been carried out on sheet metal using ER- 4043(AlSi5) as a filler metal and argon as shielded gas. The welded joints were tested by X-ray radiography and Faulty pieces were excluded.

Welding joints without defects are subjected to heat treatment including heating the joints in furnace to 170 °C for half an hour then air cooling to rel

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Diyala Agricultural Sciences Journal (dasj)
(OLIGO-X) the effect of salinity of irrigation water and magnetisation and soaking Alalascorbek acid and extracted sea Your protected agriculture. DALIA in germination and growth of seedlings seeds of hybrid option
...Show More Authors

Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy control of mobile robot in slippery environment
...Show More Authors

 

The problem of independent motion control of mobile robot (МR) in conditions when unforeseen changes of conditions of interaction of wheels with a surface are considered. An example of such changes can be sudden entrance МR a slippery surface. The deployment of an autonomous unmanned ground vehicle for field applications provides the means by which the risk to personnel can be minimized and operational capabilities improved. In rough terrain, it is critical for mobile robots to maintain good wheel traction. Wheel slip could cause the rover to lose control and become trapped. This paper describes the application of fuzzy control to a feedback system within slippery environment. The study is conducted on an example of М

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Oral Health Status, Salivary MMP-8& Secretory Leukocyte Peptidase Inhibitor (SLPI) Among Uncontrolled Type-I Diabetes Mellitus In Iraqi Patients
...Show More Authors

Background: diabetes is a metabolic disease characterized by hyperglycemia that results in deficiency or absence of insulin production. The dental caries and gingivitis/periodontitis are widespread chronic diseases in diabetes. The aim of the present study was determined the salivary matrix metalloproteinase (MMP-8), Secretory Leukocyte Peptidase Inhibitor (SLPI) and oral health status among uncontrolled diabetic group in comparison with healthy control group. Materials and Methods: The total sample composed of 90 adults aged (18-35) years. Divided into 60 uncontrolled diabetic patients (HbA1c >7%) and 30 healthy control group. Unstimulated saliva was collected from each subject with type-I DM, BMI, duration of diabetes, HbA1c%, DMFT, gingi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Pathological And Immunological Study On Infection With Escherichia Coli In ale BALB/c mice
...Show More Authors

View Publication
Scopus (81)
Crossref (54)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Aip Conference Proceedings
Fabricated and investigated the structure and super conductivity properties of Bi2Sr2Can-1CunO2n+4+δ compound
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Nov 29 2025
Journal Name
Journal Of Physical Education
Agility and its relationship with of scoring accuracy for young footballers aged (14-16) years
...Show More Authors

View Publication
Publication Date
Sun Sep 03 2023
Journal Name
Misan Journal Of Academic Studies
A review on various methods for dehazing images
...Show More Authors

In this paper, a literature survey was introduced to study of enhancing the hazy images , because most of the images captured in outdoor images have low contrast, color distortion, and limited visual because the weather conditions such as haze and that leads to decrease the quality of images capture. This study is of great importance in many applications such as surveillance, detection, remote sensing, aerial image, recognition, radar, etc. The published researches on haze removal are divided into several divisions, some of which depend on enhancement the image, some of which depend on the physical model of deformation, and some of them depend on the number of images used and are divided into single-image and multiple images dehazing model

... Show More