Measuring the level of communicative competence in news headlines and the level of stylistic and semantic processing in its formulation requires creating a quantitative scale based on the bases on building the scales and their standards. As judging by scientific of journalism studies lies in the possibility of quantifying the journalistic knowledge, i.e. the ability of this knowledge to shift from qualitative language to its equivalent in the language of numbers.
News headlines and editorial processing are one of the journalistic knowledges that should be studied, analyzed stylistically and semantically; their conclusions drawn and expressed in numbers. Press knowledge is divided into two types:<
... Show MoreThe aim of this study to identify the effect of using two strategies for active learning ( Jigsaw Strategy & Problems Solving) in learning some balanced beam's skills in artistic gymnastics for women , as well as to identify the best of the three methods (jigsaw strategy , problems solving and the traditional method) in learning some skills balance beam , the research has used the experimental methodology, and the subject included the students of the college of Physical Education and Sports Sciences / University of Baghdad / third grade and by the lot was selected (10) students for each group of groups Search three and The statistical package for social sciences (SPSS) was used means, the standard deviation and the (T.test), the one way a n
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreThe aim of the current research is to reveal the effect of using brain-based learning theory strategies on the achievement of Art Education students in the subject of Teaching Methods. The experimental design with two equal experimental and control groups was used. The experimental design with two independent and equal groups was used, and the total of the research sample was (60) male and female students, (30) male and female students represented the experimental group, and (30) male and female students represented the control group. The researcher prepared the research tool represented by the cognitive achievement test consisting of (20) questions, and it was characterized by honesty and reliability, and the experiment lasted (6) weeks
... Show MoreIn this work, the Whittaker wave functions were used to study the nuclear density distributions and elastic electron scattering charge form factors for proton-rich nuclei and their corresponding stable nuclei (10,8B, 13,9C, 14,12N and 19,17F). The parameters of Whittaker’s basis were fixed to generate the experimental values of available size radii. The Whittaker basis was connected to harmonic-oscillator basis through boundary condition at match point. The nuclear shell model was opted with pure configuration for all studied nuclei to compute aforementioned studied quantities except 10
Integrated reservoir rock typing in carbonate reservoirs is a significant step in reservoir modelling. The key purpose of this study is the identification of integrated rock types in the Sarvak Formation of an Iranian oilfield. In this study, electrofacies (EFAC) analysis of the Sarvak reservoir was done in detail to determine the reservoir quality and rock types of the Sarvak Formation in the studied field. The core data and conventional petrophysical logs were used for rock typing. Some petrophysical logs such as porosity, sonic, neutron, density, and Photo electric factor were applied as input data for electrofacies analysis. Multi-Resolution Graph-Based Clustering was used among six approaches, resulting in four electrofacies af
... Show MoreThis research paper aimed to quantitively characterize the pore structure of shale reservoirs. Six samples of Silurian shale from the Ahnet basin were selected for nitrogen adsorption-desorption analysis. Experimental findings showed that all the samples are mainly composed of mesopores with slit-like shaped pores, as well as the Barrett-Joyner-Halenda pore volume ranging from 0.014 to 0.046 cm3/ 100 g, where the lowest value has recorded in the AHTT-1 sample, whereas the highest one in AHTT-6, while the rest samples (AHTT-2, AHTT-3, AHTT-4, AHTT-5) have a similar average value of 0.03 cm3/ 100 g. Meanwhile, the surface area and pore size distribution were in the range of 3.8 to 11.1 m2 / g and 1.7 to 40 nm, respectively.
... Show MoreRandom throwing of industrial waste has a significant impact on the environment unless it takes into account the conditions of engineered destroying and/or re-used. Taking the advantage of re-using waste materials in engineering projects represents a well-planned project in order to resolve a lot of engineering problems for some difficult soils. The objective of this study was to evaluate the capability and effects of Rubber Shreds (RS) from scrap torn belts towards improving the shear strength of soft clay. A direct shear tests were conducted on soft clay-RS mixture. The following parameters were investigated to study the influence of RS content, water content, normal stress, and dilation ratio. From experimental test results it was fou
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More