The primary issue addressed in this research revolves around identifying the interactive elements provided by the Twitter platform and understanding their utilization by digital newspapers with official accounts. These newspapers broadcast content in line with their policies. This study is classified within descriptive research that employed a survey method and content analysis tool. The methodology relies on the "how was it said?" approach to categorize the analysis. The research yielded the following results:
Twitter utilized numerous interactive elements for disseminating tweets, which include "text, branching links, hashtags, digital images, digital videos, digital audio, and digital polls." However, these elements were not adopted by the digital newspapers, as they did not utilize digital audio and polls at all.
Analysis system of sports players is very important for individuals in weightlifting. Assessment of player and strength is important for the performance of weightlifting. This paper proposes an analytical method for weightlifters with check-by-frame video. This analysis system can compute the major steps of seven positions in both snatch and clean and jerk methods in frame-video weightlifting monitoring of movements. Each user can compute the major steps of the seven positions of Hu moments among two frames in the video during training, and the Euclidian distance can be computed for the Hu moment values and lifting moment values in the snatch and clean and jerk methods during training. The outcome of the proposed system shows on efficien
... Show MoreAbstract
Objective(s): The study aims to measure the effectiveness of the program on removing dead tissue for burn patients by testing the nurses before the program in addition to testing them again after implementing the educational program.
Methodology: The study is quantitative in nature (one experimental) and will employ pre- and post-testing techniques between October 17, 2020 and March 20, 2022. A non-probability (purposive) sample of 24 nurses working in the Azadi Teaching Hospital's Burns and Plastic Surgery Center was chosen. The experimental survey of nursing practice, a literature review, scientific records, and previous research were all taken into considerat
... Show MoreExcessive intake of fluoride, mainly through drinking water is a serious health hazard affecting humans worldwide. In this study, the defluoridation capacities of locally available raw waste beef bones have been estimated. Several experimental parameters including contact time, pH, bone dose, fluoride initial concentration, bone grains size, agitation rate, and the effect of co-existence of anions in actual samples of wastewater were studied for fluoride removal from aqueous solutions. Results indicated excellent fluoride removal effeciency up to 99.7% at fluoride initial concentration of 10 mg F/L and 120 min contact time. Maximum fluoride uptake was obtained at neutral pH range 6-7. Fluoride removal kinetic was well described by the ps
... Show MoreToday, dimethyl ether (DME) is changing to ordinarily worn as a superb aerosol propellant and refrigerant for its eco-friendly characteristics. Lately, with the development of novel chemical energy in the coal industries, it has become a fascinating field of research as an alternative green fuel for diesel machines due to the high cetane number. The DME synthesis processes include catalytic dehydrating methanol in an adiabatic fixed-bed reactor. In this study, to investigate the chemical conditions of the methanol dehydration reaction, CFD simulations of the adiabatic reactor have been assessed. The advantage of the work is a sensitivity analysis was run to find the effect of pressure, kinetics, and velocity on the reactor performan
... Show MoreThis paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More