This paper deals with a central issue in the field of human communication and reveals the roaming monitoring of the incitement and hatred speech and violence in media, its language and its methods. In this paper, the researcher seeks to provide a scientific framework for the nature of the discourse of incitement, hatred speech, violence, and the role that media can play in solving conflicts with their different dimensions and in building community peace and preventing the emergence of conflicts among different parties and in different environments. In this paper, the following themes are discussed:
The root of the discourse of hatred and incitement
The nature and dimensions of the discourse of incitement and hatred speech
The negative roles of the contents of letters of incitement and hatred speech, hate and violence
Language and incitement, hatred and violence
Language features in hatred speech
Hate and incitement speech in the internet
Ration power plants, to generate power, have become common worldwide. One such one is the steam power plant. In such plants, various moving parts of heavy machines generate a lot of noise. Operators are subjected to high levels of noise. High noise level exposure leads to psychological as well physiological problems; different kinds of ill effects. It results in deteriorated work efficiency, although the exact nature of work performance is still unknown. To predict work efficiency deterioration, neuro-fuzzy tools are being used in research. It has been established that a neuro-fuzzy computing system helps in identification and analysis of fuzzy models. The last decade has seen substantial growth in development of various neuro-fuzzy systems
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThe research aimed to identify and build two specialized scales for cognitive load and mental stress and to identify the level of each of them among 110-meter steeplechase runners among youth, and to prepare a psychological counseling approach to reduce the level of cognitive load and mental stress among 110-meter steeplechase runners among youth, so that the two research hypotheses are that there are differences. There are statistically significant differences between the results of the pre- and post-tests of the experimental group in measuring cognitive load. There are statistically significant differences between the results of the pre- and post-tests of the experimental group in measuring mental stress. The experimental method w
... Show MoreCancer disease has a complicated pathophysiology and is one of the major causes of death and morbidity. Classical cancer therapies include chemotherapy, radiation therapy, and immunotherapy. A typical treatment is chemotherapy, which delivers cytotoxic medications to patients to suppress the uncontrolled growth of cancerous cells. Conventional oral medication has a number of drawbacks, including a lack of selectivity, cytotoxicity, and multi-drug resistance, all of which offer significant obstacles to effective cancer treatment. Multidrug resistance (MDR) remains a major challenge for effective cancer chemotherapeutic interventions. The advent of nanotechnology approach has developed the field of tumor diagnosis and treatment. Cancer nanote
... Show MoreThe study aimed to build a suggested conception for employing gamification in teaching the general education curricula. Using the analytical method of the previous analytical studies in Teaching, which agreed with the determinants of the analysis of 20 studies from 2014 to 2019, they come on order: points, badges, leaderboards, and then levels. The four most commonly used theories are the theory of self-determination, flow theory, the theory of planned behavior and social theory. In addition, the researcher identified the most commonly used models in gamification, respectively: the ARCS model and the user-based design model. Based on the results of the analysis and using the descriptive approach, the researcher presented a practical perc
... Show MoreThe research seeks to identify the image of foreign oil companies operating in Iraq among the public of Basra, and the research aims to clarify the mental image of foreign oil companies among the Iraqi public, and to identify the extent to which the Iraqi public benefit from the social responsibility programs offered by foreign oil companies and their contribution to improving the standard of living and services for the population. Nearby areas and society as a whole, the research is classified within descriptive research, and the researcher used the survey method for the Iraqi public in Basra governorate, which includes the areas in which these companies are located, and he used the scale tool to find out, so he distributed 600 que
... Show MoreAbstract :
In view of the fact that high blood pressure is one of the serious human diseases that a person can get without having to feel them, which is caused by many reasons therefore it became necessary to do research in this subject and to express these many factors by specific causes through studying it using (factor analysis).
So the researcher got to the five factors that explains only 71% of the total variation in this phenomenon is the subject of the research, where ((overweight)) and ((alcohol in abundance)) and ((smoking)) and ((lack of exercise)) are the reasons that influential the most in the incidence of this disease.
The Iraqi culture faced a set of challenges that can be diagnosed with the most prominent features as follows:
- The dominance of authoritarian political systems which entails authoritarian regimes with the absence of contemporary political concepts of human rights.
- The prevalence of non- informed cultural systems which have the shortage of capabilities that enable them to activate cultural elements in positive references, historical, or seclusion on itself and not be able to interact with the current active cultures.
- Stagnant economic conditions have not had a decent life for individuals, or a certain level of well-being, as well as poor services and others.
- Social life controlled by the prevai
Building numerical reservoir simulation model with a view to model actual case requires enormous amount of data and information. Such modeling and simulation processes normally require lengthy time and different sets of field data and experimental tests that are usually very expensive. In addition, the availability, quality and accessibility of all necessary data are very limited, especially for the green field. The degree of complexities of such modelling increases significantly especially in the case of heterogeneous nature typically inherited in unconventional reservoirs. In this perspective, this study focuses on exploring the possibility of simplifying the numerical simulation pr