The paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah).
The paper is descriptive following the survey approach and data analysis approach.
The paper has come up with the following findings:
1. The Terrorist Organizations Al Qaeda and ISIS used twelve promoting methods in the opening articles of the E-Newspapers; the emotional empathy method comes top among them.
2. They utilized the International World Web (Internet) to promote their methods and thinking via E-newspapers.
The research aims at the possibility of measuring the technical and scale efficiency (SE) of the departments of the College of Administration and Economics at the University of Baghdad for a period lasting 8 years, from the academic year 2013-2014 to 2018-2019 using the method of Applied Data Analysis with an input and output orientation to maintain the distinguished competitive position and try to identify weaknesses in performance and address them. Nevertheless, the research problem lies in diagnosing the most acceptable specializations in the labor market and determining the reasons for students’ reluctance to enter some departments. Furthermore, the (Win4DEAp) program was used to measure technical and scale efficiency (SE) and rely on
... Show MoreIn a resource-limited world, there is an urgent need to develop new economic models, from the traditional unsustainable industrial model of product consumption and disposal, to a new model based on the concepts of sustainability in its comprehensive sense, the so-called circular economy, using fewer resources in manufacturing processes and changing practices in product disposal to waste, by removing its use, recycling and manufacturing to start another manufacturing process. In an era of intense competition in domestic and global markets, the importance of the circular economy is highlighted in its ability to strengthen the competitiveness of enterprises in those markets, by reducing the cost and increasing the quality of the pro
... Show MoreBased on analyzing the properties of Bernstein polynomials, the extended orthonormal Bernstein polynomials, defined on the interval [0, 1] for n=7 is achieved. Another method for computing operational matrices of derivative and integration D_b and R_(n+1)^B respectively is presented. Also the result of the proposed method is compared with true answers to show the convergence and advantages of the new method.
Polyethersulfone (PES) ultrafiltration membrane blending NaX zeolite crystals as a hydrophilic additive was examined for zinc (II) and lead ions Pb (II) removal from aqueous solutions. The effect of NaX zeolite content on the permeation flux and removal efficiency was studied. The results showed that adding zeolite to the polymer matrix enhanced the permeation flux. The permeation flux of all the zeolite/PES matrix membranes was higher than the pristine membrane. No significant improvement was observed in the removal of Zn (II) ions using all prepared membranes as the removal percentage did not raise above 29.2%. However, the removal percentage of Pb (II) ions was enhanced to 97% using a membrane containing 0.9%wt. zeolite. Also, it was
... Show MoreA novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show More