Media theories and studies have provided many diligences on the concept of social media and the circle of influence, including the theory of social marketing which deals with how to promote ideas espoused by the elite in a society to become a recognized social value. The emergence of social networks provided a revolutionary breakthrough, taking the media to unprecedented horizons; and giving its users great opportunities to influence and move across borders without restrictions and censorship, except in a relatively limited manner. So, the emergence of social media has created channels of live broadcasting from its audience in a method of development that changes the essence of the known communication theories; and stops the monopoly of the media message industry to convey it to a broader and more comprehensive range, with an influential and interactive capacity that communication experts have not imagined. Therefore, the reform and change movements in our Arab and Islamic world are invited, today, to take advantage of the internet revolution to the maximum extent in the fields of organization, administration, communication, media, political struggle and other aspects of life. Can we understand the historical significance of the internet revolution? Referring to the international experiences in the cases of “Tunisia and Egypt”, the media, according to the social marketing theory, raises awareness among the public - through media campaigns that aim to intensify knowledge to modify behavior by increasing the information sent - to influence the targeted sectors of the public. The media, as well, supports media messages by personal contacts; and continues to present messages in the means of communication. Then, the public becomes interested in the formation of a mental image through information and ideas. Right here, the contactor seeks to form that mental image to link the subject with the interests of the public and its aspirations. In a later step, the organizer begins designing new messages to reach more specific behavioral outcomes as an instance making a decision. Then, it comes the stage of creating specific events to ensure continued interest in a topic, and cover those specific events on the level of media and masses. Afterwards, it is time to urge the public to take an exact action expressing the idea by advocating the adoption of ideas in which communication messages are focused. As a result, who makes the change? The question that must be answered after the repetition of the Tunisian scene in Egypt and the expansion of the “Atlas of Arab Popular Uprisings” is: Does the media play a supporting role in social change by strengthening the public sphere?
One of the recent significant but challenging research studies in computational biology and bioinformatics is to unveil protein complexes from protein-protein interaction networks (PPINs). However, the development of a reliable algorithm to detect more complexes with high quality is still ongoing in many studies. The main contribution of this paper is to improve the effectiveness of the well-known modularity density ( ) model when used as a single objective optimization function in the framework of the canonical evolutionary algorithm (EA). To this end, the design of the EA is modified with a gene ontology-based mutation operator, where the aim is to make a positive collaboration between the modularity density model and the proposed
... Show MoreThe study deals with the issue of multi-choice linear mathematical programming. The right side of the constraints will be multi-choice. However, the issue of multi-purpose mathematical programming can not be solved directly through linear or nonlinear techniques. The idea is to transform this matter into a normal linear problem and solve it In this research, a simple technique is introduced that enables us to deal with this issue as regular linear programming. The idea is to introduce a number of binary variables And its use to create a linear combination gives one parameter was used multiple. As well as the options of linear programming model to maximize profits to the General Company for Plastic Industries product irrigation sy
... Show MoreThis paper aimed to determine the Optimal Reliable Frequency (ORF) that can maintain certain connection link between different transmitter/receiver stations laid over the Iraqi territory. Three different transmitting sites were chosen as tested stations located in the northern, central, and southern regions of Iraq. These sites are Mosul, Baghdad, and Basra, respectively. In this study, the years 2009 and 2014, which represent the minimum and maximum years of solar cycle 24, were chosen to examine the effect of low and high solar activity on the determined ORF. The datasets of the Best Usable Frequency (BUF) were calculated using the ASAPS international communication model. An analytical study was made on the generated BUF parameter data
... Show MoreBackground: despite the rise in the incidence of renal cell carcinoma attributed to availability of medical imaging, a considerable decline in mortality is an association. Morbidity-wise, the shift from radical nephrectomy to partial nephrectomy is the trend for now. Multiple scoring systems have been introduced over the past decades to help surgeons choose between radical and partial nephrectomy. One commonly used system is the RENAL nephrometry score that was first introduced by Kutikov and Uzzo in 2009.
Objective: to evaluate the role of RENAL nephrometry scoring system in predicting the surgical technique to use to resect renal masses and associated perioperative outcomes.
... Show MoreA fast moving infrared excess source (G2) which is widely interpreted as a core-less gas and dust cloud approaches Sagittarius A* (Sgr A*) on a presumably elliptical orbit. VLT
The improvement in Direction of Arrival (DOA) estimation when the received signals impinge on Active-Parasitic Antenna (APA) arrays will be studied in this work. An APA array consists of several active antennas; others are parasitic antennas. The responses to the received signals are measured at the loaded terminals of the active element. The terminals of the parasitic element are shorted. The effect of the received signals on the parasites, i.e., the induced short-circuit current, is mutually coupled to the active elements. Eigen decomposition of the covariance matrix of the measurements of the APA array generates a third subspace in addition to the traditional signal and noise subspaces generated by the all-active ante
... Show MoreThis Study aimed To know The relation between Types of blood and health problems which human Suffered from , and the effect of food intake on health.
Samples of study contained 269 person aged between 30 – 70 years which choiced randomly for sex , we are take all in formation about samples of study by form paper contian sex , age, type of blood , weight (kg) , height (cm) , smoking or.not , sporting or not, problems in digestive tract , sensitivity for foods , heart problems , ratio of cholesterol in blood , Sinusitis , Asthma , diabetic meliuts , arritable bowel syndrome , diaherra , problems in kidney and urination , hypertension , anemia , alternation in liver function , arthritis with form record in daily food intake and its ade
The research aimed to compare the performance of the commercial and the Islamic banks listed in the Palestinian's Stock Exchange .To achieve the objectives of the study we selected all the commercial and the Islamic banks listed in the Palestinian Stock Exchange to obtain the necessary data for the analysis process during the period of (2009-2013) .the comparison based on the performance indicators ( liquidity rate, profitability rate ,the activity rate and the market rate).
a statistical method was used to analyze the date to find the performance differences between the commercial banks,
... Show MoreA key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show More