Preferred Language
Articles
/
abaa-193
Methods of US propaganda in Iraq- A Study of Coalition Provisional Authority and US Army Data after 2003
...Show More Authors

with an organized propaganda campaign. This military campaign was helped to formulate its speech by many institutions, research centers, and knowledge and intelligence circles in order to mobilize public opinion gain supporters and face the opponents by different means depending on a variety of styles to achieve its required effects. 
          After the US occupation of Iraq, US media fighters sought to influence the Iraqi public opinion and making them convinced them of the important presence of US military forces in Iraq which necessitated finding its justification through the use of persuasive techniques in its intensive propaganda campaigns. 
  This research discusses the most important styles of propaganda used by the Americans in Iraq.
The research analyzes the data used by the Coalition Provisional Authority and the leadership of the US military in Iraq. It is an analytical study of 195 articles. 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of The College Of Education For Women
Bayiyatan Abi Firas Al-Hamadaniy's on the horns of ad dilemma of prison and longing a stylistic analytical study
...Show More Authors

Abstract

The current study aims to study one Firas Al- Himdani's  Romeyat poems (320 – 357 AH), he was one of sham poets in the era of the Abbasid as to know the glories of the knight and Arabic poet, whose message led to preserve the honor of the nation and Islam prestige , along with exposing the better one . His message includes Arabic merits and high values in respect of chivalry , encouragement , sacrifice , forgiveness and tolerance in addition to morality and patience .

View Publication
Publication Date
Wed May 05 2021
Journal Name
Journal Of Petroleum Research And Studies
The Role of Chemistry of the Oil-Field Water in the Distribution of Reservoir Pressures: A Case Study of Mishrif Reservoir in the Southern Oil-Fields, Iraq
...Show More Authors

Mishrif Formation is the main reservoir in oil-fields (North Rumaila, South Rumaila, Majnoon, Zubair and West Qurna) which located at Basrah southern Iraq. The Inductively coupled plasma-Mass spectrometer (ICP-MS) was used for the water chemistry analysis and Scanning Electron Microprobe (SEM) for the purpose of mineralogy diagnosis. A weak acidic water of salinity six-time greater than seawater plays a role in generating the formation pressure and controlling the fluid flow. The potentiometric subsurface maps were modeled and the direction of super-pressure sites that are of a great importance in the oil exploration were marked to pay attention during future drilling.

View Publication
Crossref
Publication Date
Tue Mar 03 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Public Budget and the Roles of Legislative and Executive Power Regarding It with Reference to Iraq)2004-2011)
...Show More Authors

The public budget is regarded a main tool for economic and social development. The preparation of the public budget constitute an important stream which enriches the developmental efforts and the definition of its priorities, therefore it is the focus point of many specializations. The public budget has numerous functions. It is a means to precise and to execute the political and economic goals of the executive authority, a mirror of the economic structure which reflects its strength and weakness points, specifies its revenues and others. Since the parliament is the voice of the society which expresses its interests, then, it must monitor the performance of the government so that the participation of the legislative authority in

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
International Educational Scientific Research Journal
EFFICIENTMETHODSOFIRISRECOGNITION
...Show More Authors

Identification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit

... Show More
Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and

... Show More
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
Lying in Arthur Miller's The Crucible: A Pragmatic Study: هديل محمود إبراهيم , جمعه قادر حسين
...Show More Authors

Lying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts fou

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
A study of the phonetic changes of Arabic loanwords in Balochi: بررسی تغییرات آوایی وام واژه های عربی در زبان بلوچی
...Show More Authors

 Abstract  Lanɡauaɡes, like humans, need communication and interaction to prosper. One of the ways for a language to flourish is to borrow words from other languages. The southern regions of Iran and the coastal countries of Persian Gulf have had strong cultural relations since old times, with language being a dimension of these relations. With their land being geographically located in the realm of Islamic civilization and being Muslims,  Baloch people have had strong connections with the Arab world and the Arabic language.Thus, many Arabic words have made their ways into Balochi language either directly or indirectly through persian language. Since each language has its own unique sound structure, these loanwords have undergone ph

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Evaluation of Sex Hormone Levels in Benign Prostatic Hyperplasia Patients Treated with 5 Alpha-Reductase Inhibitor (Finasteride) in Amara city/Iraq
...Show More Authors

The present study aimed to determine the serum sex hormone levels among Benign Prostatic Hyperplasia (BPH) patients before and after 3 months of oral administration of 5-α reductase inhibitor(finasteride). Forty BPH patients and 40 healthy men from Amara city were involved in this study, their ages were between 40-59 year. They were all subjected  to direct estimation of hormones by MinVidas method including Testosterone (T), Estradiol (E2), Follicle Stimulating Hormone (FSH), Luteinizing Hormone (LH), Prolactin (PRL), and Dihydrotestosterone (DHT) before and after 3 months of treatment with 5α-reductase inhibitor (finasteride) (the healthy individuals didn’t take finasteride).The results showed that T level was significantly lo

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref