Abstract The dissemination of knowledge is no longer confined to schools and universities, not even books. For nearly two centuries, the media have become prominent in disseminating knowledge and culture, in its public and particularly political aspects. After the development of the media from newspapers and magazines to the visual media, their role has increased from the dissemination of abstract information and abstract knowledge towards the process of forming new knowledge through what it publishes and broadcasts from different programs such as drama, news and talk shows. The impact of the media has changed the overall community awareness. Half a century ago the media was not so powerful and widespread. The evolution of the 1990s made it more influential than ever before. While the era of satellite television and the Internet has been announced over the past few decades, within such a short period of time, they have achieved a more cognitive dimension than paper journalism in two centuries and nearly a century of radio and television. This is all due to its wide spread and ease of use. The nature of the knowledge the public received was radically different in both quantity and quality. If we are talking about the political aspect of this knowledge, the influence of the media has reached a level of change of conviction and then it came to the change of individual and community political awareness. This has been achieved by political media, especially the media owned, controlled, operated or influenced by political figures, parties or entities. The aim of these bodies is to promote the views of these figures who exercise political action by being in power or in the opposition or are the media that receives money from those bodies to broadcast the information they wish.
There is a correlation between the occurrence of anxiety and the production of inflammatory mediators, and red ginger rhizome is a well-known herbal product with a high content of phenolic and flavonoid compounds that can be used as anti-inflammatories and antioxidants. The aim of study to evaluate the effect of red ginger as antianxiety in mice (Mus musculus) BALB/c strain by measuring levels of TNF-α, IL-6 and IL-10. Anxiety model mice were carried out by giving treatment with the Forced Swimming Test (FST) for 7 days then assessed by carrying out the Elevated Plus Maze for Mice (EPM) test for one day. After the treatment, the anxiety mice model was made, followed by administration of red ginger ethanol extract therapy for 14 days.
... Show MoreBACKGROUND: Three-dimensional (3D) printing is an evolving technology that has been used recently in a wide spectrum of applications. AIM: The objective is to evaluate the application of 3D printing in various neurosurgical practice. PATIENTS AND METHODS: This pilot study was conducted in the neurosurgical hospital in Baghdad/Iraq between July 2018 and July 2019. An X, Y, and Z printer was used. The working team included neurosurgeons, biomedical engineers, and bio-technicians. The procedure starts with obtaining Magnetic resonance imaging (MRI) or computed tomography (CT) scan in particular protocols. The MRI, and CT or angiography images were imported into a 3D programmer for DICOM images called 3D slice where these files con
... Show Moreيكشف هذا المقال عن مشكلة الصفات ذات المكون الكمي والتي تعتبر واحدة من اقوى الموارد المكونة للكلمات التعبيرية والتقويمية و يتم تحليل التركيبات الدلالية ذات الاوجه المتعددة التي تنشا من عملية توظيف الصفات المشتقة بمساعدة اللواحق والتي تدل على الاتجاه العام للغات السلافية وذلك لتطوير الدلالات العاطفية والتقييمية في الكلمات ذات معنى الميزة او الخاصية يتم تقديم تعريف انماط تكوين المعاني الضمنية في دلالات
... Show MoreTeresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce
... Show MoreA total 474 argasid ticks removed from 617 hosts including bats, rodents, and birds were found belong to four species of the genus Argos. One of which A. reflexus is reported for the first time for Iraq. Some informations regarding the infestation rate, intensity and some biological data are provided.
Crop coefficient for cherries was evaluated by measure the water consumption in Michigan State to find its variation with time as the plant growth. Crop coefficients value (Kc) for cherries were predicated by Michigan State University (MSU) and also by Food and Agriculture Organization (FAO) according to consume of water through the season. In this paper crop coefficients for cherries are modified accordingly to the actual measurements of soil moisture content. Actual evapotranspiration (consumptive use) were measured by the soil moisture readings using Time Domain Reflectometers (TDR), and compared with the actual potential evapotranspiration that calculated by using modified Penman-Monteith equation which depends on metrological statio
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More