with an organized propaganda campaign. This military campaign was helped to formulate its speech by many institutions, research centers, and knowledge and intelligence circles in order to mobilize public opinion gain supporters and face the opponents by different means depending on a variety of styles to achieve its required effects.
After the US occupation of Iraq, US media fighters sought to influence the Iraqi public opinion and making them convinced them of the important presence of US military forces in Iraq which necessitated finding its justification through the use of persuasive techniques in its intensive propaganda campaigns.
This research discusses the most important styles of propaganda used by the Americans in Iraq.
The research analyzes the data used by the Coalition Provisional Authority and the leadership of the US military in Iraq. It is an analytical study of 195 articles.
Abstract
The current study aims to study one Firas Al- Himdani's Romeyat poems (320 – 357 AH), he was one of sham poets in the era of the Abbasid as to know the glories of the knight and Arabic poet, whose message led to preserve the honor of the nation and Islam prestige , along with exposing the better one . His message includes Arabic merits and high values in respect of chivalry , encouragement , sacrifice , forgiveness and tolerance in addition to morality and patience .
Mishrif Formation is the main reservoir in oil-fields (North Rumaila, South Rumaila, Majnoon, Zubair and West Qurna) which located at Basrah southern Iraq. The Inductively coupled plasma-Mass spectrometer (ICP-MS) was used for the water chemistry analysis and Scanning Electron Microprobe (SEM) for the purpose of mineralogy diagnosis. A weak acidic water of salinity six-time greater than seawater plays a role in generating the formation pressure and controlling the fluid flow. The potentiometric subsurface maps were modeled and the direction of super-pressure sites that are of a great importance in the oil exploration were marked to pay attention during future drilling.
In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThe public budget is regarded a main tool for economic and social development. The preparation of the public budget constitute an important stream which enriches the developmental efforts and the definition of its priorities, therefore it is the focus point of many specializations. The public budget has numerous functions. It is a means to precise and to execute the political and economic goals of the executive authority, a mirror of the economic structure which reflects its strength and weakness points, specifies its revenues and others. Since the parliament is the voice of the society which expresses its interests, then, it must monitor the performance of the government so that the participation of the legislative authority in
... Show MoreIdentification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreLying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts fou
... Show MoreAbstract Lanɡauaɡes, like humans, need communication and interaction to prosper. One of the ways for a language to flourish is to borrow words from other languages. The southern regions of Iran and the coastal countries of Persian Gulf have had strong cultural relations since old times, with language being a dimension of these relations. With their land being geographically located in the realm of Islamic civilization and being Muslims, Baloch people have had strong connections with the Arab world and the Arabic language.Thus, many Arabic words have made their ways into Balochi language either directly or indirectly through persian language. Since each language has its own unique sound structure, these loanwords have undergone ph
... Show MoreThe present study aimed to determine the serum sex hormone levels among Benign Prostatic Hyperplasia (BPH) patients before and after 3 months of oral administration of 5-α reductase inhibitor(finasteride). Forty BPH patients and 40 healthy men from Amara city were involved in this study, their ages were between 40-59 year. They were all subjected to direct estimation of hormones by MinVidas method including Testosterone (T), Estradiol (E2), Follicle Stimulating Hormone (FSH), Luteinizing Hormone (LH), Prolactin (PRL), and Dihydrotestosterone (DHT) before and after 3 months of treatment with 5α-reductase inhibitor (finasteride) (the healthy individuals didn’t take finasteride).The results showed that T level was significantly lo
... Show More