with an organized propaganda campaign. This military campaign was helped to formulate its speech by many institutions, research centers, and knowledge and intelligence circles in order to mobilize public opinion gain supporters and face the opponents by different means depending on a variety of styles to achieve its required effects.
After the US occupation of Iraq, US media fighters sought to influence the Iraqi public opinion and making them convinced them of the important presence of US military forces in Iraq which necessitated finding its justification through the use of persuasive techniques in its intensive propaganda campaigns.
This research discusses the most important
CuO nanoparticles were synthesized in two different ways, firstly by precipitation method using copper acetate monohydrate Cu(CO2CH13)2·H2O, glacial acetic acid (CH3COOH) and sodium hydroxide(NaOH), and secondly by sol-gel method using copper chloride(CuCl2), sodium hydroxide (NaOH) and ethanol (C2H6O). Results of scanning electron microscopy (SEM) showed that different CuO nanostructures (spherical and Reef) can be formed using precipitation and sol- gel process, respectively, at which the particle size was found to be less than 2 µm. X-ray diffraction (XRD)manifested that the pure synthesized powder has no inclusions that may exist during preparations. XRD result
... Show MoreThis study aims at identifying how Baghdad Municipality employs public relations in law enforcement operations and the role played by the Municipality in communication and communicating with the public, raising their awareness and educating them to not abuse public property. As for the research tools, the researcher used the questionnaire as a data collection tool in addition to an analytical description of the means and methods of communication for public relations on Baghdad Municipality Facebook page.
The research comes out with a set of result; the most important of which are:
The means through which citizens learned about the existence of campaigns to impose the law an eliminate violati
In this paper ,the problem of point estimation for the two parameters of logistic distribution has been investigated using simulation technique. The rank sampling set estimator method which is one of the Non_Baysian procedure and Lindley approximation estimator method which is one of the Baysian method were used to estimate the parameters of logistic distribution. Comparing between these two mentioned methods by employing mean square error measure and mean absolute percentage error measure .At last simulation technique used to generate many number of samples sizes to compare between these methods.
Background: This review aims to discuss various canine retraction techniques using frictionless mechanics. Methods: Between 1930 and February 2022, searches were conducted about various canine retraction techniques using fixed orthodontic appliances in various databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and manual searching. Results: After removing the duplicate articles, publications that described how to use archwires to perform canine retraction with the archwires were included. Conclusions: The pros and cons of various canine retraction techniques using archwires were thoroughly discussed. T-loop is the preferred spring of all because of it
... Show Morein this work the polymides were prepared as rthemally stable polymers by diffrent ways
Background: This review aimed at explaining different methods of canine retraction along the archwire. Methods: Searching for different methods of canine retraction using fixed orthodontic appliances was carried out using different databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and hand searching from 1930 till February 2022. Results: After excluding the duplicate articles, papers describing the methods of canine retraction along the archwires were included. The most commonly used methods are NiTi closed coil spring and elastic chain. Conclusions: Various methods of canine retraction along the archwires were explained in detail regarding their adv
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreIn this work, the rate of charge transfer (CT) reaction at the N3-ZnS interface was calculated using a quantitative computational model to evaluate the efficiency of N3-ZnS heterojunction dye-sensitized solar cell devices using different types of solvents. This work discussed the influence of the effective driving energy force on the charge transport rate and performance of N3-ZnS devices with various solvents based on a donor-acceptor model. A solar cell model was used to study the optical efficiency when changing some of its parameters, such as the type of material and the thickness of the film, as they are important factors influencing the quality of the solar cell. It was found that the transition energy varies with different so
... Show More