Preferred Language
Articles
/
abaa-170
The Persuasive Methods of ISIS in Recruiting Individuals (Scientific Approach)
...Show More Authors

The rapid success and the field dilation of Daish organization in both Iraq and Syria make academic institutes and research centers to pay attention to its propaganda means to gain its public opinion, and to further investigation about new methods employed by this organization to disseminate its messages to the public, particularly young people in large areas of the world. This organization uses traditional propaganda techniques on psychological war and its levels, social network sites and platforms that are distributed online. This study seeks to expose more persuasive methods used by the organization to gain multiple classes of society and to disseminate its extremist ideological thoughts. It also studies the psychological operation and mental deception to achieve its goals and strengthens its presence on the occupied areas. This research also focuses on other Daish’s propaganda efforts comparable with the deceptive nature of such terrorist organizations, generally like propaganda of clash between the groups or different social classes, agitation of enthusiasm passion, the use of new electronic technologies of illustration to increase the psychological impact depending on the expertise and funds are obtained in different ways. The study found a number of conclusions, including:
The study concludes with the following results:
1- Daish organization realizes the importance and power of media to gain public opinion, supporters and sympathizers since the beginning of its appearance representative by Abu Musab al-Zarqawi
2- Daish has additional power factors after its dilation and occupied cities in Iraq and Syria as a result of the growth of its financial resources and it polarizes new technical experts.
3-The propaganda system of Daish uses various recruit techniques and psychological operations to make youth, women and children be involved to expand its supporters by which it implement special armed operations
4- Daish has used the preachers, imams of mosques, social networking sites, info graphics, and electronic forums as a means to implicate recruits and teach them ways of belonging to this organization as well as how to make explosives via the internet.
5- It owns several propaganda arms forming the skeleton of its electronic arms including productive and audio-visual centers as well as publications like Dabiq magazine, Alshamilha magazine, and Khansa magazine.
6- Daish organization depends not only on mass communication through its new and traditional means, but also uses direct means of persuasions by training preachers and some individual practices to raise enthusiasm and passion by using the normal cassette or compact disk ( CD).
7- It uses the deceptive style and bright words to create a historical depth of its formation and show an alleged link of caliphate with the Islamic caliphate in the era of the Prophet Muhammad and his Caliphs.
8- Daish relies on persuasive techniques of psychology in order to lure young people and women, to recruit its supporters.
9- Daish shows the children, who call them cubs caliphs, in its propaganda through a series of short films. These cubs› caliphs are involved in military, field, and psychological training programs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Wed Nov 01 2023
Journal Name
Solar Energy
Optimizing performance of water-cooled photovoltaic-thermal modules: A 3D numerical approach
...Show More Authors

To evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult

... Show More
View Publication
Scopus (24)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sun Apr 02 2023
Journal Name
Mathematical Modelling Of Engineering Problems
Traffic Classification of IoT Devices by Utilizing Spike Neural Network Learning Approach
...Show More Authors

Whenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model bas

... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 11 2024
Journal Name
Edelweiss Applied Science And Technology
Learning styles according to Entwistle model and their relationship to mathematical excellence among scientific fifth-grade female students
...Show More Authors

The objective of the present study is to determine the nature and direction of the correlation between mathematical excellence and learning styles as defined by the Entwistle, model in fifth-grade scientific female students. The descriptive correlational approach was implemented by the two researchers to accomplish the research objectives. A scale was developed to assess the learning styles of female students in the sample in accordance with the Entwistle, model. : (Knowledge, understanding, application, analysis, synthesis, evaluation, systematic thinking, creativity), and the research community was determined by the female students of the scientific fifth grade in the morning preparatory and secondary schools of the General Direct

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Aug 17 2020
Journal Name
International Journal Of Applied Mechanics And Engineering
Analysis of structural concrete bar members based on secant stiffness methods
...Show More Authors

In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated

... Show More
Scopus
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Comparison of Different DEM Generation Methods based on Open Source Datasets
...Show More Authors

Digital Elevation Model (DEM) is one of the developed techniques for relief representation.  The definition of a DEM construction is the modeling technique of earth surface from existing data. DEM plays a role as one of the fundamental information requirement that has been generally utilized in GIS data structures. The main aim of this research is to present a methodology for assessing DEMs generation methods. The DEMs data will be extracted from open source data e.g. Google Earth. The tested data will be compared with data produced from formal institutions such as General Directorate of Surveying. The study area has been chosen in south of Iraq (Al-Gharraf / Dhi Qar governorate. The methods of DEMs creation are kri

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Partial Least Squares and Principal Components Methods by Simulation
...Show More Authors

Abstract                                                                                              

The methods of the Principal Components and Partial Least Squares can be regard very important methods  in the regression analysis, whe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Iterative Methods for Approximation of Fixed Points Via Like Contraction Mappings
...Show More Authors
Abstract<p>The aim of this paper, is to study different iteration algorithms types two steps called, modified SP, Ishikawa, Picard-S iteration and M-iteration, which is faster than of others by using like contraction mappings. On the other hand, the M-iteration is better than of modified SP, Ishikawa and Picard-S iterations. Also, we support our analytic proof with a numerical example.</p>
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Comparison of Different DEM Generation Methods based on Open Source Datasets
...Show More Authors

Digital Elevation Model (DEM) is one of the developed techniques for relief representation.  The definition of a DEM construction is the modeling technique of earth surface from existing data. DEM plays a role as one of the fundamental information requirement that has been generally utilized in GIS data structures. The main aim of this research is to present a methodology for assessing DEMs generation methods. The DEMs data will be extracted from open source data e.g. Google Earth. The tested data will be compared with data produced from formal institutions such as General Directorate of Surveying. The study area has been chosen in south of Iraq (Al-Gharraf / Dhi Qar governorate. The methods of DEMs creation are kriging, IDW (inver

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Effect of Laser Cutting Methods on Hole Deviation and Surface Integrity
...Show More Authors

In the present work usedNd:YAG laser systems of different output characteristic were employed to study the drilling process of material used in scientific and industrial fields. This material include Manganese hard steel. Our study went into the affecting parameters in drilling of Manganese hard steel by laser. Drilling process is achieved through material absorption of part of the incident laser beam. It is the resultant of interfering both, laser beam and material properties and the focusing conditions of the beam. The results as shown that the increase in the laser pulse energy over the used level has raised the hole diameter, depth and increased the hole taper. In addition to that a hole taper was affected by the laser energy, the fo

... Show More
View Publication Preview PDF