Preferred Language
Articles
/
abaa-453
Online blogging journalism
...Show More Authors

The Internet, networks and the means of communication in the world of communication and information have greatly influenced all aspects of the information cycle until things have been turned upside down, and it has even been said that today the world can be separated into two worlds: the world of pre-internet and post-Internet.

 

Perhaps one of the most important data of the Internet in the world of information and journalism is electronic publishing, which comes blogging as one of its forms. Blogs, which have begun slowly in the form of personal diaries, developed and spread on the Internet very quickly and started to have its own universe, the world of blogging. It has begun to make its way in the world of journalism to the extent that it is competing with the traditional press (radio, radio, newspapers) and has a community of bloggers ( Bloggers), writers, and readers.

 

From the standpoint of Internet sociology, blogs are seen as a means of expression, communication, and advertising for organizations and individuals. On the other hand, blogs are seen as one of the social networking methods that can drive owners and pioneers to engage and adapt to content management techniques to meet their own needs to develop a vibrant virtual community.

Hence this research is meant to address the topic of blogs on the Internet due to the lack the scarcity of Arabic writings on blogs, and the small number of Arab blogs on the Internet. Researchers believe that this situation is due to the non-spread of the culture of blogs in the Arab countries, which led to ignorance of blogs and their presence on the Internet, and how to create, manage and maintain and benefit from them.

The importance of this research comes in its contribution to the dissemination of the culture of blogs, which will lead to the spread of blogs on the Internet and thus provide great opportunities for those looking for news or free opinion or events through a neutral view not influenced by political, social or government censorship. Which is often subjected to and influenced by the traditional press. The spread of Arab blogs on the Internet will open the way for free expression of opinion without any influence or diligence that can be practiced in the traditional press. In this research, the researcher used the descriptive approach based on the description and analysis of blogs on the Internet, in addition to the observations obtained from the literature published topic and from visiting and browsing many blogs on the Internet.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Journal Of Engineering
Measuring the Attribute Accuracy and Completeness for the OpenStreetMap Roads Networks for Two Regions in Iraq
...Show More Authors

The OpenStreetMap (OSM) project aims to establish a free geospatial database for the entire world which is editable by international volunteers. The OSM database contains a wide range of different types of geographical data and characteristics, including highways, buildings, and land use regions. The varying scientific backgrounds of the volunteers can affect the quality of the spatial data that is produced and shared on the internet as an OSM dataset. This study aims to compare the completeness and attribute accuracy of the OSM road networks with the data supplied by a digitizing process for areas in the Baghdad and Thi-Qar governorates. The analyses are primarily based on calculating the portion of the commission (extr

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 22 2026
Journal Name
The Mesopotamian Journal Of Computer Science
AI-Driven Cybersecurity, Big Data, and Business Intelligence: Impacts on Strategic Flexibility and Entrepreneurship in Iraqi ISPs
...Show More Authors

This research aims to explore the status effects of the Sudden, and gradual of AI-Driven Cyber Security (AIDC), Big data analytics and Business Intelligence (BI) The strategic flexibility (SF) and entrepreneurship (ENT) on Iraqi internet services providers ISPs. The work fills an important lacunae in what the advanced dimensions of technology have with regard to its influencing both SF and ENT outcomes in developing economy context, where empirical evidences are scant. A cross-sectional survey based on a quantitative research methodology was conducted on 113 professionals in Iraqi telecommunication sector. A partial least squares structural equation modeling (PLS-SEM) approach was adopted to examine 10 hypotheses concerning the relationship

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Robotics And Control (jrc)
Artificial Intelligence Based Deep Bayesian Neural Network (DBNN) Toward Personalized Treatment of Leukemia with Stem Cells
...Show More Authors

The dynamic development of computer and software technology in recent years was accompanied by the expansion and widespread implementation of artificial intelligence (AI) based methods in many aspects of human life. A prominent field where rapid progress was observed are high‐throughput methods in biology that generate big amounts of data that need to be processed and analyzed. Therefore, AI methods are more and more applied in the biomedical field, among others for RNA‐protein binding sites prediction, DNA sequence function prediction, protein‐protein interaction prediction, or biomedical image classification. Stem cells are widely used in biomedical research, e.g., leukemia or other disease studies. Our proposed approach of

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Engineering
Design of New Hybrid Neural Controller for Nonlinear CSTR System based on Identification
...Show More Authors

This paper proposes improving the structure of the neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Two learning algorithms are used to adjust the parameters weight of the hybrid neural structure with its serial-parallel configuration; the first one is supervised learning algorithm based Back Propagation Algorithm (BPA) and the second one is an intelligent algorithm n

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sat Aug 18 2018
Journal Name
Journal Of Engineering And Applied Sciences
Performance Evaluation of Transport Protocols for Mobile Ad Hoc Networks
...Show More Authors

Mobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10

... Show More
View Publication
Publication Date
Sun Jan 27 2019
Journal Name
Civil Engineering Journal
Prediction of Sediment Accumulation Model for Trunk Sewer Using Multiple Linear Regression and Neural Network Techniques
...Show More Authors

Sewer sediment deposition is an important aspect as it relates to several operational and environmental problems. It concerns municipalities as it affects the sewer system and contributes to sewer failure which has a catastrophic effect if happened in trunks or interceptors. Sewer rehabilitation is a costly process and complex in terms of choosing the method of rehabilitation and individual sewers to be rehabilitated.  For such a complex process, inspection techniques assist in the decision-making process; though, it may add to the total expenditure of the project as it requires special tools and trained personnel. For developing countries, Inspection could prohibit the rehabilitation proceeds. In this study, the researchers propos

... Show More
View Publication
Scopus (20)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agriculture And Statistical Science
COMPARISON OF FORECASTING OF THE RISK OF CORONAVIRUS (COVID-19) IN HIGH-QUALITY AND LOW-QUALITY HEALTHCARE SYSTEMS, USING ANN MODELS
...Show More Authors

COVID-19 is a disease that has abnormal over 170 nations worldwide. The number of infected people (either sick or dead) has been growing at a worrying ratio in virtually all the affected countries. Forecasting procedures can be instructed so helping in scheming well plans and in captivating creative conclusions. These procedures measure the conditions of the previous thus allowing well forecasts around the state to arise in the future. These predictions strength helps to make contradiction of likely pressures and significances. Forecasting procedures production a very main character in elastic precise predictions. In this case study used two models in order to diagnose optimal approach by compared the outputs. This study was introduce

... Show More
Preview PDF
Scopus (3)
Scopus