This research investigates the engagement of the Iraqi audience with ethnographic programs and their impact on knowledge enhancement and intellectual perspectives. A questionnaire consisting of closed-ended questions was designed and administered to a purposive sample of 400 participants who exclusively follow ethnographic programs and documentary channels. The data were transcribed and subjected to statistical analysis using the SPSS software to ensure reliability and test hypotheses. The findings revealed that Al Jazeera Documentary Channel had the highest viewership percentage among respondents for ethnographic programs, while DW (Deutsche Welle) had the lowest viewership percentage. This suggests that Al Jazee
... Show MoreStructural, optical, and electrical properties of thin films of CdS : Zn prepared by the solution – growth technique are reported as a function of zinc concentration. CdS are window layers influencing the photovoltaic response of CIS solar cells. The zinc doping concentration was varied from 0.05 to 0.5 wt %, zinc doping apparently increase the band gap and lowers the resistivity. All beneficial optical properties of chemically deposited CdS thin films for application as window material in heterojunction optoelectronic devices are retained. Heat treatment in air at 400 °C for 1h modify crystalline structure, optical, and electrical properties of solution growth deposited CdS : Zn films.
Iraq has the second largest proven oil reserves in the world. According to oil experts, it is expected that the Iraq's reserves to rise to 200+ billion barrels of high-grade crude.
Oil is a strategic commodity for producing and exporting countries in general, and Iraq in particular, as demonstrated by the international experience that oil is an important means to achieve economic growth, an important tool in the overall economic, social and political development. It is also an important source of hard currency for any national economy and a means to connect the local economy and the global economy. In this paper we focus our attention on selecting the best regression model that explain the effect of human capita
... Show MoreThis study aims to derive a general relation between line loads that acting on two-way slab system and the equivalent uniformly distributed loads. This relation will be so useful to structural designer that are used to working with a uniformly distributed load and enable them to use the traditional methods for analysis of two-way systems (e.g. Direct Design Method). Two types of slab systems, Slab System with Beams and Flat Slab Systems, have been considered in this study to include the effect of aspect ratio and type of slab on the proposed relation. Five aspect ratios, l2/l1 of 0.5, 0.75, 1.0, 1.5 and 2.0, have been considered for both types of two-way systems.
All necessary finite element analyses have been executed with SAFE Soft
In this work an approach has been developed to investigate the influence of surface roughness on thermohydrodynamic performance in aligned and misaligned journal bearings by considering an average flow model and deriving the shear flow factor for various roughness configurations, similar to the pressure flow factor. An average Reynolds equation for rough surfaces is defined in term of pressure and shear flow factors, which can be obtained by numerical flow simulation, though the use of measured or numerically generated rough surfaces. Reynolds, heat conduction and energy equations are solved simultaneously by using a suitable numerical technique (Finite Difference Method) to obtain the pressure and temperature di
... Show MoreThe remediation oil production by matrix acidizing method on the well named "X" (for confidential reasons) is scrutinized in this paper. Initial production of 1150 bpd, production index of 2.8 STB/Psi/d and permeability of 150md, in 2018 two years down the lane this dropped to 450 bpd, production index 0.7 STB/Psi/d. The declined observed on the production index is trouble shouted and after elimination of (no completion damage/perforation damage), the skin is calculated by carrying out a well test (build-up test) whose extrapolation in excel over times gave us a skin of 40.The reservoir heterogeneity, containing >20% of feldspar, carbonates and paraffin’s guided thematrix acidizing design and treatment proposition to remedy thi
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MoreSpatial Intelligence is a mental ability to understand and solve real-world problems. These visual-spatial representations are fundamental in learning various "STEM" topics, like digital drawing, art presentations, creating graphical representations, 2D designs. Opportunity to interact with real and/or virtual objects. It is a good opportunity in applying new techniques such as the augmenter, which is able to clarify mathematical tables, concepts and generalizations greatly to the visualization, understanding and mastery of concepts mathematically. The purpose of the research is to investigate impact of using AR technology in developing spatial intelligence for secondary school students, Baghdad. The quasi-experimental design was us
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More