Preferred Language
Articles
/
eUKxgZoBMeyNPGM3oc0B
The media message of ISIS: The content of the discourse and the mechanisms of media confrontation. The media message of ISIS: The content of the discourse and the mechanisms of media confrontation.
...Show More Authors

يهدف البحث الى صياغة استراتيجية اعلامية لمواجهة اعلام التنظيمات الارهابية

Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Development Binary Search Algorithm
...Show More Authors

There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Opcion
Gender differences in motivation toward learning EFL skills among international students
...Show More Authors

This paper aims to examine the effects of the gender differences on learners‟ motivation in learning the four skills of English as a foreign language as well as to identify the proper types of motivation for males and females via a qualitative semi-structured interview. The findings showed that all the males have extrinsic motivation in all four skills. On the other hand, females differ among themselves in their motivation. In conclusion, it is also the teachers‟ responsibility to guide and direct their learners to achieve better outcomes in learning the four EFL skills.

View Publication Preview PDF
Scopus (1)
Scopus
Publication Date
Mon Jan 02 2017
Journal Name
مجلة البحوث التربوية والنفسية
أثر إستراتيجية عظم السمك بتحصيل الكيمياء والتعلم المنظم ذاتيا
...Show More Authors

study aimed to investigate the effect of fish bone in the of chemistry and self-organized learning for students of the second grade‚ achievement . The study sample consisted of 84 students from the second grade students middel in the of alrasheed boysschool, of the Directorate of Educational Karkh II, in two divisions, Division of (a) an experimental group that studied the strategy fish bone, and the Division (d) a control group which studied the usual way. The results indicated the presence of significant differences in favor of the experimental group that studied using the fish bone in achievement and learning self-organized strategy students

Preview PDF
Publication Date
Thu Mar 01 2018
Journal Name
الاستاذ
أثر استراتيجية المماثلة في تحصيل مادة الكيمياء والذكاء الانفعالي لطلاب الصف الخامس العلمي الاحيائي
...Show More Authors

هدف البحث الى الكشف عن فاعلية استراتيجية المماثلة في تحصيل مادة الكيمياء والذكاء الانفعالي لطلاب الصف الخامس العلمي الاحيائي. وتكونت عينة البحث من (28 ) طالبا من طلبة الصف الخامس العلمي الاحيائي في اعدادية الشاكرين للبنين, التابعة لمديرية تربية بغداد – الكرخ الثانية, موزعين بين شعبتين بالتساوي, شعبة (أ) وهي المجموعة الضابطة التي درست على وفق الطريقة الاعتيادية, وشعبة ( ب) وهي المجموعة التجريبية والتي درست على و

... Show More
Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
ADVERTISING CAMPAIGNS IN TV CHANNELS : (A Research Drawn from A Master Thesis)
...Show More Authors

Television culture has become the most dangerous of our time. It manipulates with minds and hearts together; and forms consciousness. It transforms societies into actual forces rejecting certain principles by guiding the media landscape through visible connotations acceptable to the public; or provokes the citizen against elements that put a burden on the viewer or the public in order to create a positive reaction to the subject of combating terrorism by combining these ads in line with what the public wants of security and tranquility and a decent living after suffering from terrorism in the past years.

Therefore, this research deals with television advertisements as one of the most important fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Tikrit University For Humanities
ثورات الأندلسيين بعد تسليم مدينة غرناطة دراسة تاريخية للأسباب والنتائج
...Show More Authors

الكتابة عن الأندلس بعد تسليم مدينة غرناطة يحمل في ثناياه ألم كبير، لأن الأندلسيين عاشوا تجربة إنسانية قاسية سببها الأساس غياب التسامح الديني والعدالة الاجتماعية، الأمر الذي دفعهم للثورة مطالبين بحقوقهم التي نصت عليها معاهدة تسليم المدينة. فقد  عاش أولئك حياة صعبة ، فكانوا صورة  للصراع  بين حضارتين  الإسلامية والغربية ،  ويمكن تلمس ذلك الصراع من خلال دراسة ثوراتهم ضد السلطة الحاكمة التي يبدو من تتبع أح

... Show More
View Publication
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
ETHICAL JOURNALISM IN IRAQ AFTER 2003: Baghdad edition as a model
...Show More Authors

The fact of having Journalism being open to people from different orientations professions, working as journalists requiring protection just to spread corruption, is one of the biggest threats faced by journalism.

Journalists noticed the spread of unprincipled journalists with no journalistic ethics amongst them, they tried to protect their profession from these corrupt outsiders who might annihilate the mighty of journalism. The principles of the journalism profession known as journalistic ethics, are one the most important formulations of the law concluded by the journalists and those concerned by the the profession, they were then published in public in order to prove their professionalism, especially for those who don’t und

... Show More
View Publication Preview PDF
Crossref