According to the theory of regular geometric functions, the relevance of geometry to analysis is a critical feature. One of the significant tools to study operators is to utilize the convolution product. The dynamic techniques of convolution have attracted numerous complex analyses in current research. In this effort, an attempt is made by utilizing the said techniques to study a new linear complex operator connecting an incomplete beta function and a Hurwitz–Lerch zeta function of certain meromorphic functions. Furthermore, we employ a method based on the first-order differential subordination to derive new and better differential complex inequalities, namely differential subordinations.
The researcher has studied in his research (International Public Relations methods in building the state's image through Cyberspace)
, analytical study of the Facebook and twitter pages for British foreign office , the role was played by the International Public Relations in building the mental image of British , especially after the new media and internet have became influential role in political life . and became an important tools used by political institutions as ministries of foreign affairs in the twenty: one century .
The researcher identified the problem of this study with the following question:
(what is the role of the International Public Relations in building the mental image of state through Cyberspace)
To answer
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreObjectives: This study aims to evaluate the role of social media in promoting awareness of green university initiatives and assess the effectiveness of sustainability reports in engaging students at Baghdad University. In alignment with Sustainable Development Goal 12 (Responsible Consumption and Production),It seeks to provide recommendations for enhancing digital platforms for sustainability communication. Theoretical Framework: The study is grounded in the Green University Model, Social Media Engagement Theory, and the Sustainability Reporting Framework, which emphasize integrating sustainable practices in education, using digital platforms for community engagement, and leveraging sustainability reports for transparency and
... Show MoreIn this work, varying compositions of SiO2 micro filler were added
with the Polyvinyl Chloride (PVC) and samples have been prepared
using film casting technique. The results have been analyzed and
compared for PVC samples with (1 wt%, 3 wt%, 5 wt% and 10 wt%)
SiO2 micro filler. Mechanical characteristics such as tensile strength,
elongation at break and Young`s modulus were measured for all the
samples, where the tensile strength was increased from 8.39 Mpa for
purified PVC to 16 Mpa for 3% SiO2/PVC composite. Also, thermal
conductivity measurement values illustrated that composite materials
have a good thermal insulation at 10 wt. %, thermal conductivity was
decreased from 0.1684 W/m.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreAllah, in his Holy Quran introduced great prophet stories so as to learn from. The greatness of these stories lies in Allah himself being the author. He portrays his characters, lays the plot, defines the tests and Al- Ibtilla, provides ways of being patient, using Duaa to end all hard tests and generously describing the greatness of his rewards to all those who are patient. The purpose of this research is to study selected English prophet stories for children on three levels, the stories ability to convey lessons and Islamic teachings to children who do not speak Arabic, the stories portray the Islamic concept of patience, the teaching and learning styles andstrategies that Allah uses with each prophet. The concept of patience is defined a
... Show More