with an organized propaganda campaign. This military campaign was helped to formulate its speech by many institutions, research centers, and knowledge and intelligence circles in order to mobilize public opinion gain supporters and face the opponents by different means depending on a variety of styles to achieve its required effects.
After the US occupation of Iraq, US media fighters sought to influence the Iraqi public opinion and making them convinced them of the important presence of US military forces in Iraq which necessitated finding its justification through the use of persuasive techniques in its intensive propaganda campaigns.
This research discusses the most important styles of propaganda used by the Americans in Iraq.
The research analyzes the data used by the Coalition Provisional Authority and the leadership of the US military in Iraq. It is an analytical study of 195 articles.
The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreIn this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.
The present work deals with an experimental investigation of charging and discharging processes in thermal storage system using a phase change material PCM. Paraffin wax was used as the PCM which is formed in spherical capsules and packed in a cylindrical packed column which acted as an energy storage system. Air was used as the heat transfer fluid HTF in thermal storage unit. The effect of flow rate and inlet temperature of HTF on the time of charging and discharging process were studied. The results showed that the faster storage of thermal energy can be made by high flow rate of heat transfer fluid HTF and high inlet temperature of heat transfer fluid. It was found that at 65°C HTF inlet temperature, the melting and solidification pr
... Show MoreThe study showed significant differences between the average weight lens and the average amount protein in the lens between that Kestrel Falco tinnunculus L. and the Collared Dove Streptopelia decaocto F. , also the study electrical migration of lens proteins having one bundle of crystalline –? in Kestrel compared with three bundles in Collared Dove, two bundles of crystalline – ? in both , and crystalline – ? appeared as one bundle in both birds.
In this paper, the dynamics of scavenger species predation of both susceptible and infected prey at different rates with prey refuge is mathematically proposed and studied. It is supposed that the disease was spread by direct contact between susceptible prey with infected prey described by Holling type-II infection function. The existence, uniqueness, and boundedness of the solution are investigated. The stability constraints of all equilibrium points are determined. In addition to establishing some sufficient conditions for global stability of them by using suitable Lyapunov functions. Finally, these theoretical results are shown and verified with numerical simulations.
The study included adding antimony oxide to mixtures of coating metal surfaces (Enameling), after it was selected ceramic materials used in the coating metal pieces of the type of steel and cast iron in two layers. The first is called a ground coat and the second is a cover coat.
Ceramic materials layer for ground coat have been melted down in
platinum crucible at a temperature of 1200oC to prepare the glass
mixture (Frit). It was coated on metals at a temperature of 780oC for
two minutes, while the second layer was prepared glass mixture
(Frit) at a temperature of 1200oC, but was coated at a temperature of
760oC for two minutes.
Underwent tests crystalline state of powders (Frits) and enameled samples using X-ray di