This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in different ways, the most important of which are narrative texts supported by pictures that express the nature of the security event, and the respondents' preference for social networking sites in following up on press releases.
This study deals with knowing the types of research in public relations studies at the Faculty of Mass Communication for the period from 1989 to 2007 and knowing the methods that researchers used in their studies, as well as knowing the methods and tools of scientific research that were used, and whether one method or tool is used more than others, and knowing Samples used in the analysis. As well as the contents and types of this research The institutions that were subjected to the study, and the preparation of the respondents This research aims to answer the following questions:. A- What are the types of research and methods that were used in university theses that dealt with the topic? Public Relations at the Faculty of Media from 1989
... Show MoreThis research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreOne wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.
DNA, as the basis of every living cell, is one of the most important and influential scientific discoveries. This research aims to identify and compare the organizational DNA to the leadership practices of school principals in the Sultanate of Oman and to reveal the similarity between principals’ leadership practices and the structure of DNA. In addition, it intends to identify any statistically significant differences between the responses of the participants due to the study variables: gender, job title and experience. A questionnaire was designed and data were collected from a randomly selected sample composed of (100) teachers in the Sultanate of Oman. The study found limitless diversity in the characteristics of DNA of leadership
... Show MoreAbstract
This research aims to the relationship and the effect of concurrent engineering dimensions analyze (product design, process design, and supply chain design) on the dimensions of strategic performance (efficiency, and effectiveness) The research was conducted in public Zora Electrical Industries Company, on a sample of departments and officials, engineers, managers and people in the company amounted to (45) . A questionnaire was used for the purpose of data collection which has been adopted, with the use of statistical methods via computerized system (spss) for processing data , identifying them and testing the research hypotheses. The research
... Show MoreThe research aims to study the importance of applying lean accounting techniques and the tools and methods they contain, the most important of which is the “value path costs” technique and its impact on rationalizing and controlling costs, as well as reducing production costs in general and reducing quality costs in a way Special by reducing or eliminating waste and waste in both time and resources and meeting customer requirements. In order to achieve this goal, the researcher relied on the application of lean accounting tools by obtaining data related to the mill, in addition to that, the information obtained as a result of field coexistence in the mill and being able to view the records of the mill in the research sample. From the
... Show More