In October 2019, Iraq and Lebanon witnessed widespread protests, which aroused the interest of the media, as they began with demands for the provision of services, then escalated with the overthrow of the political system. The researchers chose a satellite channel that represents a direction for a country accused of entering the line of protests. This paper aims to analyze the main bulletin of Al-Alam channel to find out how it deals with the protests in the news. It is classified descriptively, using the survey method and the method of content analysis. The study community was represented by the main news bulletin of Al-Alam channel. The researchers adopted a deliberate sample for the period from 1/10/2019 to 31/12/2019, as the bulletin intensified its coverage of the protests. The research reached a number of results, the most important of which are: framing the news about the protests within the framework of responsibility, and confirming that the demonstrators attacked property and security forces.
Background: Medical-surgical nurses are responsible of providing competent care to clients with a wide-array of acute and chronic health problems. This challenging task requires arming nurses with advanced competencies of health literacy to effectively educate their clients. However, evidence about medical-surgical nurse’s health literacy-related knowledge and experience is limited. Purposes: This study aimed to determine the level of the health literacy-related knowledge and experience among medical-surgical nurses.Design: A descriptive-cross-sectional study was conducted among a total sample of 177 nurses who were practicing in medical-surgical wards in teaching hospitals in Iraq. A convenience sampling method was used to sele
... Show MoreMaulticollinearity is a problem that always occurs when two or more predictor variables are correlated with each other. consist of the breach of one basic assumptions of the ordinary least squares method with biased estimates results, There are several methods which are proposed to handle this problem including the method To address a problem and method To address a problem , In this research a comparisons are employed between the biased method and unbiased method with Bayesian using Gamma distribution method addition to Ordinary Least Square metho
... Show MoreBackground: The SARS-CoV-2 virus causes COVID-19, a respiratory syndrome. It causes inflammation and damages several organs in the body. miRNAs play a role in regulating the infection resulting from SARS-CoV-2. MicroRNA-155, a kind of microRNA linked to viral defences, can affect the immune responses during COVID-19. Objectives: Examination of the involvement of microRNA-155 in the development and severity of COVID-19, as well as finding the correlation between microRNA-155 and viral load (copies/mL) in severe cases of the disease. Materials and Method: A case-control research study was performed between October 2022 and June 2023. It included a cohort of 120 hospitalised individuals with severe cases of COVID-19, together with 115 individu
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreHartree-Fock (HF) method relies in the calculations of nonlinear optical properties (NLO) for benzoic acid molecule. Also, another theoretical study is conducted by using the TD-DFT Density Functional Theory through B3LYP/High Base Set 6-311++G (2d,2p) on Gaussian program09. Moreover, an experimental study has been done to obtain the electrons spectrum for benzoic acid with and without ethanol. While the experimental study is done by using UV/VIS. spectrophotometer. Energy gap values of electronic transition between HOMO and LUMO is obtained from theoretical and experimental results. Consequently, the theoretical result for determining the energy gap calculated from EHOMO-LUMO wasvery close to the results of UV / VIS. spectrum. A theoretica
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show More