Media theories and studies have provided many diligences on the concept of social media and the circle of influence, including the theory of social marketing which deals with how to promote ideas espoused by the elite in a society to become a recognized social value. The emergence of social networks provided a revolutionary breakthrough, taking the media to unprecedented horizons; and giving its users great opportunities to influence and move across borders without restrictions and censorship, except in a relatively limited manner. So, the emergence of social media has created channels of live broadcasting from its audience in a method of development that changes the essence of the known communication theories; and stops the monopoly of the media message industry to convey it to a broader and more comprehensive range, with an influential and interactive capacity that communication experts have not imagined. Therefore, the reform and change movements in our Arab and Islamic world are invited, today, to take advantage of the internet revolution to the maximum extent in the fields of organization, administration, communication, media, political struggle and other aspects of life. Can we understand the historical significance of the internet revolution? Referring to the international experiences in the cases of “Tunisia and Egypt”, the media, according to the social marketing theory, raises awareness among the public - through media campaigns that aim to intensify knowledge to modify behavior by increasing the information sent - to influence the targeted sectors of the public. The media, as well, supports media messages by personal contacts; and continues to present messages in the means of communication. Then, the public becomes interested in the formation of a mental image through information and ideas. Right here, the contactor seeks to form that mental image to link the subject with the interests of the public and its aspirations. In a later step, the organizer begins designing new messages to reach more specific behavioral outcomes as an instance making a decision. Then, it comes the stage of creating specific events to ensure continued interest in a topic, and cover those specific events on the level of media and masses. Afterwards, it is time to urge the public to take an exact action expressing the idea by advocating the adoption of ideas in which communication messages are focused. As a result, who makes the change? The question that must be answered after the repetition of the Tunisian scene in Egypt and the expansion of the “Atlas of Arab Popular Uprisings” is: Does the media play a supporting role in social change by strengthening the public sphere?
This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV
... Show MoreThrough an experimental program of eighteen specimens presented in this paper, the bond strength between reinforcing bar and rubberized concrete was produced by adding waste tire rubber instead of natural aggregate. The fine and coarse aggregate was replaced in 0%, 25%, and 50% with the small pieces of a waste tire. Natural aggregate replacement ratio, rebar size, embedded rebar length, the rebar yield stress of rebar, cover, and concrete compressive strength were studied in this investigation. Ultimate bond stress, bond stress-slip response, and failure modes were presented. The experimental results reported that a reduction of 19% in bond strength was noticed in 50% replaced rubberized concrete compared with convention
... Show MoreThe purpose of this study is to measure the levels of quality control for some crude oil products in Iraqi refineries, and how they are close to the international standards, through the application of statistical methods in quality control of oil products in Iraqi refineries. Where the answers of the study sample were applied to a group of Iraqi refinery employees (Al-Dora refinery, Al-Nasiriyah refinery, and Al-Basra refinery) on the principles of quality management control, and according to the different personal characteristics (gender, age, academic qualification, number of years of experience, job level). In order to achieve the objectives of the study, a questionnaire that included (12) items, in order to collect preliminary inform
... Show MoreThis paper deals with the role of the clergy in the Church and artists in the emergence of this art, which is represented by an atmosphere of spiritual, aesthetic, artistic, technical and engineering very magnificence and is located in two Find.Chapter One: the stages of stained glass in the Middle AgesThe Architects Goths to get rid of the walls gradually, based Baloctav plane, columns and beams strengthened with the vehicle, as previously mentioned, making the building looks like a glass of excessive use of colored windows building, this art has been known to the art of stained glass And the second chapter: the stages of stained glass in the Middle Ages Department of Winston (Winston) works of stained glass since its inception in the t
... Show MoreBackground: intravenous regional anaesthesia (IVRA) is an effective method of producing anaesthesia of the extremities. Disadvantages are the rapid loss of anaesthesia after the deflation of the tourniquet and the rapid development of postoperative pain. It is important to search for agents with longer durations of action, better nerve fibre selectivity, lesser degrees of motor blockade and lower incidences of systemic toxicity.Objectives: This study was designed to evaluate and compare the clinical effects of intravenous regional anaesthesia, with lidocaine alone, or in a combination with ketamine and atracurium for better analgesia, and to examine the possible clinical advantages of using muscle relaxants (i.e., atracurium) with intrav
... Show MoreHypertension is a cardiovascular problem with high rates of epidemiology and risks of morbidity and mortality in the global area. Nitric oxide (NO) is one of the reactive oxygen species (ROS) that produced from L-arginine by nitric oxide synthase (NOS) enzyme. NO involves in various vital processes in human health, one of which is the modulation of vasoconstriction and relaxation of the vascular system. We have aimed to investigate the link between NO and NOS with hypertension in women. The relationship between NO and NOS, as well as the usefulness of them as indicators of hypertension risks were subjects of study in this article. The results have revealed that hypertensive women had significant (P<0.05) lower levels of NO (15.07±3.41 IU/m
... Show MoreThis study aims to identfy virtual plastic art exhibitions in light of the challenges of the Corona pandemic. It used a descriptive analytical method through several questions and examining future challenges via the Internet in publishing virtual plastic art exhibitions in many parts of the world in light of the challenges of the Corona pandemic. For that, it used Arab and foreign references.
The study reached many results, the most important of which are: The detection of virtual reality applications and their impact on the plastic arts exhibitions sector. Besides, the insights gained from future art gallery research with VR technology could provide direct and practical value for this sector. By using a technology, similar to the “
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More