The research problem lies in the ambiguity of the usage of propaganda contents by two main media outlets (the Russian RT and American Alhurra) in their news coverage of the Syrian crisis through their websites and the methods used by them to convince users taking into account the mutual propaganda conflict between the United States and Russia in the war against Syria. The objectives of the research can be represented by the following: investigating the contents of American and Russian electronic propaganda towards Syrian crisis.
• Identifying the contents that received most of the coverage in the Syrian crisis by the two news outlets.
• Identifying the terms and phrases that have been most used by the websites of RT and Alhurra.
• Investigating the diversity in the use of explanatory and persuasive techniques such as info graphic by both websites.
The research can be classified under descriptive researches. The survey methodology has been adopted and the content analysis has been used. The research population consists of all the news reports that were published on RT and Alhurra websites on Syrian crisis from 11/ 01/ 2006 to 12/ 31/ 2006 according to the comprehensive sampling method. The number of the news reports that were analyzed was (466), (327) from RT website and (89) from Alhurrah. The research tools included (scientific observation), interview and (coding scheme). The most important results of the research are:
1. The Syrian president Bashar al-Asad: the Russian propaganda focused on supporting him, and to ensure that he remained in office, while US propaganda focused on removing him from power.
2. The characters of the presidents: the Russian propaganda focused on the character of the Russian president Vladimir Putin, while the American propaganda did not amplify the character of US president Barack Obama.
3. The style of repetition ranked first among the other Russian propaganda styles in support of its ally al-Asad in the battle of Aleppo, while the distortion style ranked first among the American propaganda styles to show a negative image of al-Asad and his allies.
4. The Russian propaganda described the Russian-Syrian operations as (liberation operations), while the American propaganda described it as (brutal murdering), (random bombing), (crimes against humanity), (war crimes), and (massacre).
5. Al-hurrah website has not used an infographic, while the RT website has published 3 info graphs that denote the Russian propaganda dependence on diversity in electronic journalism by following intimidation policy with the enemies to manifest the Russian military power during Aleppo battle.
This research aims to clarify the advantages of statistical sampling method and provided the scientific basis of the auditor was able to defend the future of any objection to the validity of his opinion on the financial statements of the restrictions of personal rule as much as possible during the stages of the general Company for Cotton industries.Aresearc An applied study in the Board of supreme Audit (the accounts of the cotton industry), have been used, a researcher at the theoretical side to achieve the objectives of the research methodology descriptive inference in the collection and analysis of financial statements of the circle (sample) for the financial year (2008). To achieve the objectives of the field study was designed
... Show MoreDBNRSK Sayed, Journal of Strategic Research in Social Science (JoSReSS), 2020
The study aims to verify the independence of auditors working in companies and offices of the Iraqi audit, and measure the level of accounting conservatism in the financial statements of banks and insurance companies listed on the Iraq Stock Exchange, as well as a statement after the independence of the auditor on accounting conservatism in the financial statements of banks and insurance companies listed on the market Iraq Stock Exchange, as it has been measuring the independence of the auditor using the survey form was auditors working in the Iraqi audit firms were measured the level of accounting conservatism for companies sample using a form( Basu) was a statement after variables through the use of statistical models in a mann
... Show MoreThe current study deals with host-guest complex formation between cucurbit [7] urils as host and lansoprazole as guesti using PM3 (semi empirical molecules orbital calculations) also DFT calculations. In this complex, the formation of hydrogen bonding may be occurred through portal oxygen atoms(O2) of cucurbit [7] urils and amine groups (NH 2 )of the drug. The energies of HOMO and LUMO orbital’s have been computed for the host guest complex and its components. The result of the stabilization energy explained a complex formation.
This paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Ara
... Show MoreWheat straw was modified with malonic acid in order to get low cost adsorbent have a good ability to remove copper and ferric ions from aqueous solutions, chemical modification temperature was 120°C and the time was 12 h. Parameters that affect the adsorption experiments were studied and found the optimum pH were 6 and 5 for copper and iron respectively and the time interval was 120 min and the adsorbent mass was 0.1 g. The values for adsorption isotherms parameters were determined according to Langmuir [qmax were 54.64 and 61.7 mg/g while b values were 0.234 and 0.22 mg/l] , Freundlich [Kf were 16.07 and 18.89 mg/g and n were 2.77 and 3.16], Temkin [B were 0.063 and 0.074 j/mol and At were 0.143 and 1.658 l/g] and for Dubinin-Radushkev
... Show MoreThe bacterial contamination of lipsticks and face cream may become a great important matter in the medical laboratories. The present study was designed to determine the types of bacterial contamination in the face cream and lipsticks of undergraduate students. Also, the study aimed to determine the sensitivity of the isolated bacteria against many antibacterial agents. The study included 190 swabs samples from 190 face cream and lipsticks samples of the females’ students from five departments in the Medical Technology Institute, Almansour, Middle Technical University were collected in February 2018. The swab samples were collected with sterile condition and cultured on enriched Blood agar and MacConkey agar. Serial dilutions were made up
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More