The technological developments in the field of communication have witnessed considerable impact in the variables which exist in following up and conveying the events which link it’s meaning to political implications. This makes a number of satellite channels depend on the techniques of propaganda and use them in the news bulletins to achieve political aims and ends related to its formational directives where those channels allotted a considerable time in its programming transmission map to concentrate on the security and political status to complete the image of the informational scene according to the logic of its propaganda and styles in processing news for daily events.The technological developments in the field of communication have witnessed considerable impact in the variables which exist in following up and conveying the events which link it’s meaning to political implications. This makes a number of satellite channels depend on the techniques of propaganda and use them in the news bulletins to achieve political aims and ends related to its formational directives where those channels allotted a considerable time in its programming transmission map to concentrate on the security and political status to complete the image of the informational scene according to the logic of its propaganda and styles in processing news for daily events.Depending on the descriptive approach, this paper endeavored to achieve two aims: First, identifying the major propaganda styles which are used by Al-Rafidain and Al- SharqiyaNews Channels in their news bulletins. Second, discovering the minor styles which the two channels depend on in investment the propaganda activity within the news bulletins. Content Analysis Method is also used to arrive at the aims of those news implications. Of the results that have been achieved in this study Al-Rafidain and Al- Sharqiyanews depend on exaggeration and inflation as a part of its styles in the propaganda investment within their news bulletins. Moreover, Al-Rafidain Channel concentrates on the style of using Strong Emotional Motives within their propaganda investment whereas Al- SharqiyaNews Channel concentrates on the style which depends on the international reports, studies and statistics to achieve the reliability in their bulletins and propaganda implications. Finally, the study includes the news material which have been analyzed according to the overall restriction style from 1/12/2015 to 29/2/2016.
مشكلة البحث:
بين الحين والآخر تتصاعد الصيحات مطالبة بإصلاح النظام التعليمي لكي يتوافق هذا النظام مع ما يحدث في العالم من تطورات علمية وتكنولوجية تترك بصماتها على مختلف قطاعات الحياة .
ويعد المعلم وبلا شك ركنا أساسيا في هذا النظام ،وذلك لما للمعلم من تأثير أساسي في عملية التعليم والتعلم . ماذا يجدي إذا ما طورنا مناهجنا، واحسنا مباني مدارسنا، وأكثرنا من الوسائل والتقنيات ،ولم نوفر المع
... Show MoreThe Research aimed for identification the significant of health problems that occurrences through
misused of computer for those whom attaches with more than two hours daily and to identification the
nature of demographical characteristics variables and that related variables with using computer. Also to
know the level of user’s knowledge for some attaché’s equipment's and finally creating a new suggested
measurement scale for studying health problems that were occurred through misused of computer.
Creating questionnaire includes several domains (Social problems – family environment, Social problems –
external environment, some health problems attaches with related equipment's, psychological problems,
and hea
Conclusion
After this tour with Alkhund Al-Khurasani and his book “Adequacy of Fundamentals,” we can highlight the results we have got through what we have reviewed in the research:
- Al-Akhund Al-Khurasani was born and raised in a scientific environment that gave him from his childhood the opportunity to gain knowledge of achievement. Therefore, he left to seek knowledge from the beginning of his youth and toured the cities, then he went to Tehran and then He went to the holy city of Najaf, then left for Samarra, then returned to Najaf in order to work on the scholars and the student.
- Al Akhund al-Khorasani studied on several scholars , whether in Iraq or in Geran, and he
دور المعالجة الادراكية في اختزال البنية التصميمية للعلامة التجارية
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreThis paper presents a robust control method for the trajectory control of the robotic manipulator. The standard Computed Torque Control (CTC) is an important method in the robotic control systems but its not robust to system uncertainty and external disturbance. The proposed method overcome the system uncertainty and external disturbance problems. In this paper, a robustification term has been added to the standard CTC. The stability of the proposed control method is approved by the Lyapunov stability theorem. The performance of the presented controller is tested by MATLAB-Simulink environment and is compared with different control methods to illustrate its robustness and performance.
NH3 gas sensor was fabricated based on deposited of Functionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) suspension on filter paper substrates using suspension filtration method. The structural, morphological and optical properties of the MWCNTs film were characterized by XRD, AFM and FTIR techniques. XRD measurement confirmed that the structure of MWCNTs is not affected by the preparation method. The AFM images reflected highly ordered network in the form of a mat. The functional groups and types of bonding have appeared in the FTIR spectra. The fingerprint (C-C stretch) of MWCNTs appears in 1365 cm-1, and the backbone of CNTs observed at 1645 cm-1. A homemade sensi
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreIn dieser Kurzgeschichte werden die Züge der Trümmerliteratur präzis dargestellt. Die wurde von Heinrich Böll im Jahr 1958 geschrieben. In der vorliegenden Arbeit konzentriere ich mich auf vielfältige Stoffe in Bezug auf die Lage nach dem Zweiten Weltkrieg. So gab ich dieser Arbeit einen besonderen Titel, der die Dimensionen dieser Kurzgeschichte heißt. Ich meine hier, die profunde Interpretation dieses Werkes, denn ich fand zwar hinter einigen Wörtern eine ganze Geschichte, die uns der Erzähler dadurch zeigen wollte.
So teilte ich diese Wörter (Grab, Schatten, Last, Schrei) als Dimensionen, von denen diese Arbeit umgekreist wird.
Diese Arbeit besteht aus vier Kapiteln, die aufeinander aufgebaut sind. Im ersten K
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show More