with an organized propaganda campaign. This military campaign was helped to formulate its speech by many institutions, research centers, and knowledge and intelligence circles in order to mobilize public opinion gain supporters and face the opponents by different means depending on a variety of styles to achieve its required effects.
After the US occupation of Iraq, US media fighters sought to influence the Iraqi public opinion and making them convinced them of the important presence of US military forces in Iraq which necessitated finding its justification through the use of persuasive techniques in its intensive propaganda campaigns.
This research discusses the most important styles of propaganda used by the Americans in Iraq.
The research analyzes the data used by the Coalition Provisional Authority and the leadership of the US military in Iraq. It is an analytical study of 195 articles.
Many developments happened in Service Oriented architecture models but with no details in its technology and requirement. This paper presents a new Service Oriented Architecture (SOA) to all Service Enterprise (SE) according to their demands. Therefore, the goal is to build a new complete architecture model for SOA methodologies according to current technology and business requirements that could be used in a real Enterprise environment. To do this, new types of services and new model called Lego Model are explained in details, and the results of the proposed architecture model in analyzed. Consequently, the complications are reduced to support business domains of enterprise and to start associating SOA methodologies in their corporate s
... Show MoreThe purpose of this paper is to introduce a new type of compact spaces, namely semi-p-compact spaces which are stronger than compact spaces; we give properties and characterizations of semi-p-compact spaces.
Competitive swimming is a highly researched area and technological developments have aided advances in the understanding of the biomechanical principles that underpin these elements and govern propulsion. Moreover, those working in the sports field especially in swimming are interested in studying, analyzing, evaluating and developing motor skills by diagnosing the strengths and weaknesses of the skill, and accordingly, coaches and specialists correct these errors. The researchers chose this (Butterfly swimming) and the (arm length) is an important variable because the success of the stroke is greatly dependent on the propulsion generated from the arm pull, and swimmers with a longer arm span have a mechanical advantage with the resulting f
... Show MoreIn this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.
The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreThe main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreIn this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.
Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called s- closed submodule denoted by D ≤sc W, if D has no proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In this paper, we study modules which satisfies the ascending chain conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.