Social networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the questionnaire form to identify the Iraqi academic elite's attitudes towards the role of social network sites in the formation of electronic public opinion towards security crises that Iraqi society has witnessed. By distributing the questionnaire to 112 of academic lecturer of various specializations and scientific titles, the researcher has come up with a number of results:
1-lecturers at Iraqi universities use Facebook in a percentage of 92%
2-Most of the Iraqi academic elite user social networking sites for three hours every day
3-The statement “expressing public opinion towards various security events and crises” has taken the first place in a percentage of 90% ranking as the most important communicative advantages achieved when using the social networking sites.
A novel series of mixed-ligand complexes of the type, [ML1(L2)3]Clx [M= Cr(III), Fe(III), Co(II),Ni(II), Cu(II), Cd(II) and Hg(II), n = 2, 3], was synthesized using Schiff base (HL1) as main ligand, nicotinamide (L2) as secondary ligand, and the corresponding metal ions in 1:3:1 molar ratio. The main ligand, HL1 was prepared by the interaction of ampicillin drug and 4-chlorobenzophenone. The synthesized mixed ligand complexes were characterized by elemental analysis, UV-Vis, FT-IR,1H-NMR,13C-NMR and TG/DTG studies. In the mixed-ligand complexes, the Schiff base ligand, HL1 showed coordination to the central metal ion in tridentate manner via azomethine nitrogen, β-lactam ring oxygen and deprotonated carboxylic oxygen atoms, whereas the sec
... Show MoreNH3 gas sensor was fabricated based on deposited of Functionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) suspension on filter paper substrates using suspension filtration method. The structural, morphological and optical properties of the MWCNTs film were characterized by XRD, AFM and FTIR techniques. XRD measurement confirmed that the structure of MWCNTs is not affected by the preparation method. The AFM images reflected highly ordered network in the form of a mat. The functional groups and types of bonding have appeared in the FTIR spectra. The fingerprint (C-C stretch) of MWCNTs appears in 1365 cm-1, and the backbone of CNTs observed at 1645 cm-1. A homemade sensi
... Show MoreIn this study, poly4-(nicotinamido)-4-oxo-2-butenoic acid (PNOE) was prepared by the electro polymerization of 4-(nicotinamido)-4-oxo-2-butenoic acid (NOE) monomer on a 316 stainless steel (St.St) which acts as an anticorrosion coating. Fourier transforms infrared (FTIR), atomic force microscopy (AFM), scanning electron microscopy (SEM), and cyclic voltammetry were used to diagnose the structure and the properties of the prepared polymer layer. The corrosion behavior of the uncoated and coated 316 St.St were evaluated by using an electro chemical polarization technique in 0.2 M hydrochloric acid solution as a corrosive medium at a temperature range of 293 to 323 K. Nano materials, such as nano ZnO and graphene were added in di
... Show MoreSemi-parametric models analysis is one of the most interesting subjects in recent studies due to give an efficient model estimation. The problem when the response variable has one of two values either 0 ( no response) or one – with response which is called the logistic regression model.
We compare two methods Bayesian and . Then the results were compared using MSe criteria.
A simulation had been used to study the empirical behavior for the Logistic model , with different sample sizes and variances. The results using represent that the Bayesian method is better than the at small samples sizes.
... Show MoreAbstract The current research aims to identify the most prominent beliefs about coronavirus of Baghdad University students, as well as to identify the prominent beliefs toward coronavirus of male and female students. To achieve the research objectives, a questionnaire of (15) items was administered to a sample of (600) male and female students collected from ten different colleges at the university of Baghdad. The findings of the research illustrated that item (8) took priority as students believe there is a misleading about coronavirus spreading by governments, item (2) which indicated that coronavirus is man-made took level two, followed by item (10), it proposes that coronavirus emerged from the American military base in china. Additiona
... Show MoreThis study aimed to explore the relationship between cyberbullying and levels of pessimism and optimism among female university students, emphasizing the significance of these variables in students' psychological well-being. The research problem was identified in the increasing rates of cyberbullying among female students and its negative impact on optimism and pessimism, alongside the lack of effective counseling programs addressing this issue. The study sample consisted of 30 third-year students from the College of Physical Education and Sports Sciences for Women during the academic year 2023--2024. The participants were deliberately selected through a lottery method. The researchers employed the descriptive survey method as it suited the
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.