|
The research problem lies in the lack of accurate scientific perceptions concerning the reality of the communicator and the factors influencing his job. The research is aimed at introducing the communicator in the university press, clarifying the obstacles facing him, and uncovering the level of his job satisfaction and his visions of developing his work. The researcher adopted the survey method in the collection, analysis, and interpretation of the data using a questionnaire. A set of results and conclusions has been reached, most importantly are:
*The communicator performs multiple missions including writing, editing, and collecting information, in spite of the job description is assigned to him by the newspaper. In turn, this is reflected negatively on his productivity taking into account performing missions outside of his basic job in media, besides performing academic missions as for those holding post-graduate degrees. *The communicator does not have the freedom to determine the design and content of his newspaper due to several factors from which are (senior management of the foundation), (targeted audience), and (costs of the newspaper production). *The success of the communicator can be achieved by continuous administrative support to his communicative skills which reflect his persuasive abilities, and it is the credibility derived from his expertise and self-confidence that can make him influence his audience. *Poor attention given by senior management to the newspaper and scarcity of material and moral incentives has mostly affected the job of the communicator negatively combined with the presence of obstacles topped by insufficient specialized staff and scarcity of training and development especially outside of the country. *A decline in job satisfaction and audience satisfaction has been found due to the communicator needs being unmet, and scarcity of material and moral incentives. |
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreAW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 3
Software-Defined Networking (SDN) has evolved network management by detaching the control plane from the data forwarding plane, resulting in unparalleled flexibility and efficiency in network administration. However, the heterogeneity of traffic in SDN presents issues in achieving Quality of Service (QoS) demands and efficiently managing network resources. SDN traffic flows are often divided into elephant flows (EFs) and mice flows (MFs). EFs, which are distinguished by their huge packet sizes and long durations, account for a small amount of total traffic but require disproportionate network resources, thus causing congestion and delays for smaller MFs. MFs, on the other hand, have a short lifetime and are latency-sensitive, but they accou
... Show MoreBackground: Although they are not life threatening, dental caries and periodontal disease are the most predominant and widely spread oral diseases throughout the world. Another most common dental problem seen in children is dental trauma. The aims of the study included the investigation of the prevalence and severity of dental caries, gingivitis and dental plaque in relation to gender, furthermore, the prevalence and severity of the traumatized anterior teeth were assessed. Materials and Methods: This oral health survey was conducted among primary school children aged 9 years old in Al-Diwaniyah city in Iraq. The total sample composed of 600 child (320 males and 280 females) selected randomly from different school in Al-Diwaniyah city. Dia
... Show MoreThe syntheses, characterization and experimental solid state X-ray structures of five low-spin paramagnetic 2-pyridyl-(1,2,3)-triazole-copper compounds, [Cu(Ln)2Cl2], are presented in this study, for the following five Ln ligands: L1 = 2-(1-(p-tolyl)-1H-(1,2,3-triazol-4-yl)pyridine), L2 = 2-(1-(4- chlorophenyl)-1H-(1,2,3-triazol-4-yl)pyridine), L3 = 4-(4-(pyridin-2-yl)-1H-(1,2,3-triazol-4-yl)benzonitril), L4 = 2-(1-phenyl-1H-(1,2,3-triazol-4-yl)pyridine) and L5 = 2-(1-(4-(trifluoromethyl)phenyl)-1H-(1,2,3- triazol-4-yl)pyridine). These five [Cu(Ln)2Cl2] complexes each contain two bidentate 2-pyridyl-(1,2,3)- triazole (Ln) and two chloride ions as ligands, with the Cu–N(pyridine) bonds, Cu–N(triazole) and Cu–Cl bonds trans to each othe
... Show MoreThe downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ r
... Show More