This research deals with a very important subject as it tries to change the theoretical and scientific heritage and some professional rules adopted in the newsroom. Most media students have difficulties in writing news for press correctly. The researcher tries to identify the compatibility of what is published in local news agencies with professional and academic standards.
The research finds detailed editorial rules for a number of news formats which will play an important role in writing news for press easily, especially for the beginners and newcomers. Also, it discovers a new fact denying the beliefs of some researchers and writers in not having news conclusion in news edited according to the inverted pyramid pattern.
The researcher finds that the news of the sample subject to research lacks diversity because most of them are written according to the inverted pyramid pattern with absolute exclusion of the rest of the news templates, especially the gradual pattern.
One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show MoreThis world is moving towards knowledge economy which basically depends on knowledge and information. So, the economic units need to develop its financial reporting system which helps to provide useful information in timeliness for investors in accordance with the requirements of the knowledge economy and meets the needs of those investors. This research aims to revealing the reflects of knowledge economy on the approaches of financial reporting and suggesting a financial reporting model in the environment of knowledge economy, depending on combining the value approach with the events approach using database and communication technology and providing useful accounting information for all users regardless of
... Show MoreIn this paper, we will provide a proposed method to estimate missing values for the Explanatory variables for Non-Parametric Multiple Regression Model and compare it with the Imputation Arithmetic mean Method, The basis of the idea of this method was based on how to employ the causal relationship between the variables in finding an efficient estimate of the missing value, we rely on the use of the Kernel estimate by Nadaraya – Watson Estimator , and on Least Squared Cross Validation (LSCV) to estimate the Bandwidth, and we use the simulation study to compare between the two methods.
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThe Makhoul Dam project proposed to be established is considered one of the strategic projects in Iraq as it works to insurance large quantity of water spare in flood seasons, increase the storage capacity of the dams in Iraq, as well as increase food security. The Makhool Dam is located on Tigris River in Salah al-Din Governorate, and 8 km south of the meeting point of the Tigris River with the Lower Zab River. The lake area is about 256 km2. In this research, a mathematical model was prepared by using HEC-RAS Two Dimension Software to analyze the velocity patterns and water depths inside makhool dam reservoir at the highest operational water elevation, based on the designs prepared
English is spoken by its native speakers in two different forms. Reduced form which marks the colloquial and rapid speech so that it is easily produced and a citation or unreduced form which is a characteristic of careful, emphasized and slow speech.
This paper investigates Iraqi EFL university students’ production of the two forms mentioned above. The sample chosen includes twenty fourth year students, of which ten are males and the other ten are females from the Department of English of the College of Languages of the University of Duhok in Kurdistan Region of Iraq in the academic year 2020-2021. The material tested is six connective words which represent the commonest ones in every-day co
... Show More(لا مجتمــــع الا وبـــــه قـــــانو ن ) مقولـــــه اطلقهـــــا فقیـــــه رومـــــا القدیمـــــة ( شیشـرون ) فالقـانون لـیس ولیـد الیـوم وانمـا منـذ بـدء الخلیقـة بـدأت حاجـة الانسـان الـى قواعـد سـلوكیه یـنظم بهـا حیاتـه ویـرى بهـا حـدود حریتـه بحیـث لاتتجـاوز هـذه الحریة الى حدود حریة الاخرین٠واذا كانـــت المؤسســـیة ودولـــة القـــانون مـــن اهـــم معـــاییر الانتمـــاء الـــى العصر الحـدیث یـأت الخ
... Show MoreTolerance and its impact on building society