The impact of television has made it an essential technology that can't be dispensed with in all circumstances and situations, measuring the society's need for it. Some argue that there is no stronger media than television in introducing people of the world to each other, as it has the most powerful impact and attracts millions of viewers.
Television is deemed as the most effective tool of media as it is designed to capture both sound and image. The image, in itself, has the ability to engage and interact with our thoughts. In light of the aforementioned, it is noticeable that this interactive medium (television) has significantly evolved over the years, thanks to modern technologies that have been introduced over time. These advancements have added an element of credibility between both the broadcaster and the audience's interaction. It has been made possible through live broadcasts, transmissions, and the presenter's presence at the scene of the event at the time of its occurrence.
Television is the main source of news for the majority of people in various contemporary societies. The television and news programs still constitute the main center of gravity in the process of influencing viewers, and in particular when watching the news bulletin on (any channel), we quickly expect to see the news, reports and polls offered by the bulletin that affect the life of our society.
The purpose of news bulletins is to inform viewers about the current events happening in the local community, the nation as a whole, and even at the global level. It is presented through the medium of television, aided by a team of professionals such as the directors, presenters, correspondents, cameramen, sound recordists, lighting technicians and editors, who work together to create a coherent and engaging news bulletin
يكشف هذا المقال عن مشكلة الصفات ذات المكون الكمي والتي تعتبر واحدة من اقوى الموارد المكونة للكلمات التعبيرية والتقويمية و يتم تحليل التركيبات الدلالية ذات الاوجه المتعددة التي تنشا من عملية توظيف الصفات المشتقة بمساعدة اللواحق والتي تدل على الاتجاه العام للغات السلافية وذلك لتطوير الدلالات العاطفية والتقييمية في الكلمات ذات معنى الميزة او الخاصية يتم تقديم تعريف انماط تكوين المعاني الضمنية في دلالات
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show Moreلقد انبثقت رؤيا حديثة في مسرح الثمانينات من القرن العشرين كان هدفها دحر حس الاسر الذي عاشه انسان العصر الحديث وفي محاولة للارتقاء بارادته وحرية الاختيار نحو الانعتاق من محاولات المصادرة الفظة لها. وبالرغم من افتراض هذه الرؤيا انها ذات طابع سلبي, الا ان رؤيا الانتحار قدعدت بانها قادرة على ان تجعل في متناول يد الانسان احساسا طموحا بالتحكم على الاقل بنوع النهاية التي يكتبها لحياته. وقد انعكست هذة الرؤيا ال
... Show MoreConflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s
... Show MoreA total 474 argasid ticks removed from 617 hosts including bats, rodents, and birds were found belong to four species of the genus Argos. One of which A. reflexus is reported for the first time for Iraq. Some informations regarding the infestation rate, intensity and some biological data are provided.
The problem of internal sulfate attack in concrete is widespread in Iraq and neighboring countries.This is because of the high sulfate content usually present in sand and gravel used in it. In the present study the total effective sulfate in concrete was used to calculate the optimum SO3 content. Regression models were developed based on linear regression analysis to predict the optimum SO3 content usually referred as (O.G.C) in concrete. The data is separated to 155 for the development of the models and 37 for checking the models. Eight models were built for 28-days age. Then a late age (greater than 28-days) model was developed based on the predicted optimum SO3 content of 28-days and late age. Eight developed models were built for all
... Show MoreSamples (4th) reviewed are deposited and stored in the Iraqi Natural History Museum (INHM), and there are 4th of them. Sciurus anomalous (Güldenstädt, 1785) species are preserved and mummified. It is a Caucasian squirrel (S. anomalus) that was medium in size, with a grayish-to-chestnut color, a golden gray back, and a golden tail. It is found in the forests of East and Southeast Asia. The variety possessed for the study was previously registered in the vertebrate literature by several authors and was stored by scientific methods in the museum. As a result of the multiplication and growth of these species, and to know the environmental changes that occurred in them, they were compared with models and samples found throughout Iraq
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThis research deals with a part of our heritage and Arab culture, which is the poetry of contemporary Islamic poets, especially the poetry that was said in the mother in contemporary Islamic poetry, when extrapolating the offices of some contemporary Islamic poets found a clear presence of the mother, and during the search for the subject or its I found that the subject did not receive research and study, although the bureaus of contemporary Islamic poets included in it a huge amount of verses in which they stood at the mother Pharthua, and expressed their feelings and emotions towards them, and accordingly this research tagged (mother in contemporary Islamic poetry _ Dr Artistic models in models of contemporary Islamic poetry) to stand
... Show MoreRecently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visua
... Show More