يدرس هذا البحث مشكلة اعتماد الجمهور العراقي على الصحف، باعتبارها إحدى وسائل الإعلام التقليدية، في تكوين معلوماته ومعرفته العامة. وهي دراسة وصفية اعتمدت المنهج الوصفي المسحي الذي يصور الظروف أو الاتجاهات الحالية للظاهرة قيد الدراسة ويحاول تفسيرها. استخدم الباحث الاستبانة في المقام الأول كأداة بحث، حيث تم تصميمها وتوزيعها على عينة مكونة من 150 باحثا قصديا من قراء وقراء الصحف. وينتهي الباحث بالنتائج التالية: إن الصحافة المطبوعة لم تعد مشبعة ومستجيبة لاحتياجات الجمهور؛ الشعب العراقي لا يعتمد على الصحافة المطبوعة في زيادة وعيه وتطوير معارفه العامة؛ ويستخدمون الوسائط البديلة لتلبية احتياجاتهم المعرفية والعاطفية والسلوكية. نسبة كبيرة من أفراد العينة (61%) لا يعتمدون على الصحف للحصول على معلوماتهم ومعارفهم؛ كما أن نصف المستجيبين يقرأون بشكل غير منتظم لمدة تقل عن ساعة في المرة الواحدة. تعتبر الأخبار والمواضيع السياسية من أكثر المواضيع التي تهم الجمهور
The Noble Qur’an is the book of God, the Blessed and Exalted, in which is the teachings of God Almighty’s religion, which is Islam, in order for people to unite it and establish servitude to it. The individual and the society alike saw it appropriate to make my opinion alerting the seriousness of this matter, so the research was entitled (The Impact of Sins and Disobedience on the Individual and Society in the Holy Qur’an - Objective Study), knowing that we touched upon some of the effects, which we found it appropriate to mention in this research in the service of the good. Its details came in the Holy Qur’an without referring to others, noting their arrangement in the Holy Qur’an..
This research shows the issues of Ibn Hisham's illusion in its leadership of the grammarians; As Ibn Hisham attributed - during his presentation of grammatical issues - grammatical opinions to a number of grammarians claiming them in them, and after referring to the main concepts that pertain to those grammarians, we found that Ibn Hisham had delusional in those allegations, in addition to that clarifying the terms illusion and claim in the two circles of language And the terminology, and perhaps the most prominent result in this research is that he worked to investigate these issues by referring to their original sources, with an explanation of the illusions of Ibn Hisham in his attribution to these issues.
In this paper the reinforced materials manufactured from steel continues fibers are used in Aluminum matrix to build a composite material. Most of researches concentrated on reinforced materials and its position in the matrix according to its size and distribution, and their effects on the magnitude of different kinds of the stresses, so this paper presents and concentrate on the geometrical shape of reinforced material and its effects on the internal stresses and strains on the composite strength using FEM as a method for analysis after loaded by certain force showing the deference magnitudes of stresses according to the different geometrical shapes of reinforced materials.
Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreAn oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreLet be a non-trivial simple graph. A dominating set in a graph is a set of vertices such that every vertex not in the set is adjacent to at least one vertex in the set. A subset is a minimum neighborhood dominating set if is a dominating set and if for every holds. The minimum cardinality of the minimum neighborhood dominating set of a graph is called as minimum neighborhood dominating number and it is denoted by . A minimum neighborhood dominating set is a dominating set where the intersection of the neighborhoods of all vertices in the set is as small as possible, (i.e., ). The minimum neighborhood dominating number, denoted by , is the minimum cardinality of a minimum neighborhood dominating set. In other words, it is the
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThyroid disease is a common disease affecting millions worldwide. Early diagnosis and treatment of thyroid disease can help prevent more serious complications and improve long-term health outcomes. However, thyroid disease diagnosis can be challenging due to its variable symptoms and limited diagnostic tests. By processing enormous amounts of data and seeing trends that may not be immediately evident to human doctors, Machine Learning (ML) algorithms may be capable of increasing the accuracy with which thyroid disease is diagnosed. This study seeks to discover the most recent ML-based and data-driven developments and strategies for diagnosing thyroid disease while considering the challenges associated with imbalanced data in thyroid dise
... Show MoreThe main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators