The social networking sites have become one of the most important promotional instruments for their characteristic of facilitation of communication and the creation of public platform for discussion and formation of new points of view. These sites were used in the political marketing process where politicians use Facebook pages to promote their ideologies and spread their programs for the purpose of an influencing public opinion.
This research deals with the way by which political products are the Iraqi parliament. We adopt the methodology for analyzing the contents of these pages during three months starting from September,12 2016 to March 1, 2017 characterized by a lot of changes and events, in particular the beginning of the war o
Constitute a planning problem on the basis of personal experience and self-governance in the service organizations away from quantitative scientific method in planning an anchor and a platform, who made a recent research study, analysis and interpretation through scientific methodology adopted which formed its contents, The research aims to identify the true reality of production planning in service organizations, specifically in the Baghdad Hotel as a society to look, in order to assess the best strategy through the standard cost of the strategies of tracking and settlement to cope with developments on services demand changes, Search results confirmed that the settlement rates of production strategy is the best strategy in accordance wi
... Show MoreThe compound [L] was produced in the current study through the reaction of 4-aminoacetophenon with 4-methoxyaniline in the cold, concentrated HCl with 10% NaNO2. Curcumin, several transition metal complexes (Ni (II), La (III), and Hg (II)), and compound [L] were combined in EtOH to create new complexes. UV-vis spectroscopy, FTIR, AA, TGA-DSC, conductivity, chloride content, and elemental analysis (CHNS) were used to describe the structure of produced complexes. Biological activities against fungi, S. aureus (G+), Pseudomonas (G-), E. coli (G-), and Proteus (G-) were demonstrated using complexes. Depending on the outcomes of the aforementioned methods, octahedral formulas were given as the geometrical structures for each created comp
... Show MoreThe electron correlation effect for inter-shell have been analysed in terms of Fermi hole and partial Fermi hole for Li-atom in the excited states (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). Fermi hole Δf(r12) and partial Fermi hole Δg(r12 ,r1) were determined in position space. Each plot of the physical properties in this work is normalized to unity. The calculation was performed using Mathcad 14 program.
Ovako Working Postures Analyzing System (OWAS) is a widely used method for studying awkward working postures in workplaces. This study with OWAS, analyzed working postures for manual material handling of laminations at stacking workstation for water pump assembly line in Electrical Industrial Company (EICO) / Baghdad. A computer program, WinOWAS, was used for the study. In real life workstation was found that more than 26% of the working postures observed were classified as either AC2 (slightly harmful), AC3 (distinctly harmful). Postures that needed to be corrected soon (AC3) and corresponding tasks, were identified. The most stressful tasks observed were grasping, handling, and positioning of the laminations from workers. The construct
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show More