The technological developments in the field of communication have witnessed considerable impact in the variables which exist in following up and conveying the events which link it’s meaning to political implications. This makes a number of satellite channels depend on the techniques of propaganda and use them in the news bulletins to achieve political aims and ends related to its formational directives where those channels allotted a considerable time in its programming transmission map to concentrate on the security and political status to complete the image of the informational scene according to the logic of its propaganda and styles in processing news for daily events.The technological developments in the field of communication have witnessed considerable impact in the variables which exist in following up and conveying the events which link it’s meaning to political implications. This makes a number of satellite channels depend on the techniques of propaganda and use them in the news bulletins to achieve political aims and ends related to its formational directives where those channels allotted a considerable time in its programming transmission map to concentrate on the security and political status to complete the image of the informational scene according to the logic of its propaganda and styles in processing news for daily events.Depending on the descriptive approach, this paper endeavored to achieve two aims: First, identifying the major propaganda styles which are used by Al-Rafidain and Al- SharqiyaNews Channels in their news bulletins. Second, discovering the minor styles which the two channels depend on in investment the propaganda activity within the news bulletins. Content Analysis Method is also used to arrive at the aims of those news implications. Of the results that have been achieved in this study Al-Rafidain and Al- Sharqiyanews depend on exaggeration and inflation as a part of its styles in the propaganda investment within their news bulletins. Moreover, Al-Rafidain Channel concentrates on the style of using Strong Emotional Motives within their propaganda investment whereas Al- SharqiyaNews Channel concentrates on the style which depends on the international reports, studies and statistics to achieve the reliability in their bulletins and propaganda implications. Finally, the study includes the news material which have been analyzed according to the overall restriction style from 1/12/2015 to 29/2/2016.
Introduction and Aim: The pro-inflammatory cytokine IL-39, a member of the IL-12 family plays a key role in the inflammatory response by modulating immune cell activity and inflammation. A literature search shows no study undertaken for the effect of IL-39's on arthritis so far. Hence, the purpose of this study was to investigate the role of IL-39 in rheumatoid arthritis. Materials and Methods: This study involved 80 patients with rheumatoid arthritis registered at the Rheumatology Clinic at Baghdad teaching hospital. The patients were divided into three groups based on treatments received. Group 1 included patients who were not on any treatment for arthritis, Group 2 with patients on hydroxychloroquine and or prednisone treatment,
... Show MoreMany diseases can produce cardiac overload, of these disease hypertension, valve disease congenital anomaly in addition to many other disease. One of the most common diseases causing left ventricle overload is hypertension. A long term hypertension can cause myocardium hypertrophy leading to changes in the cardiac contractility and reduced efficiency. The investigations were carried out using conventional echocardiography techniques in addition to the tissue Doppler imaging (TDI) from which many noninvasive measurements can be readily obtained. The study has involved the effect of hypertension on the myocardium stiffness index through the measurement of early diastolic filling (E) and the early velocity of lateral mitral annulus (Ea
... Show MoreObstruct:  
... Show MoreBackground: Genioglossus advancement is a surgical procedure to advance the tongue in some patients with obstructive sleep apnea syndrome.The important step in this procedure is that of accurately capturing the bone segment attached to the genioglossus muscle to avoid complications such as mandibular fracture, devitalization of the inferior incisor roots, and incomplete incorporation of the genioglossus Materials and Method: Computed tomography scans were taken for 53 Iraqi adult patients (28 male and 25 female) range from (18-35) years with skeletal class I classification and intact anterior mandible dentition included in this study using sagittal and axial sections. The measurements were done for genial tubercle and anterior mandibular re
... Show MoreOne of the most difficult tasks in modern medical societies is the process of identifying a cure for many infectious diseases caused by drug-resistant microbes. Therefore, it has become necessary to discover new compounds that work in this regard. The currently prepared Schiff base, derived from thiazole, has a biological activity against bacteria and biofilms and its activity increases when it is associated with copper, zinc and platinum ions and forms metal complexes. This study highlights the synthesis and evaluation of novel biological compounds as inhibitors of bacterial growth and biofilms. A three newly complexes are resulting from the reaction of a new Schiff base ligand (LC) with metal ions (Zn, Cu, Pt). The new ligand (LC)
... Show MorePurpose: To determine the impact of service encounter in stimulating voluntary customer behaviors.
- Approach / methodology: It was selected a sample of customers Bank Iraqi Trade (TBI) was (105) individual, using a questionnaire designed in the light of previous studies, was drafted scale and tested in the light of a group of statistical methods developed (reliability coefficient, reliability coefficient composite, convergence). Then test hypotheses through structural equation modeling.
- Results: The behaviors and characteristics of the service provider in effect urged bank customers to perform voluntary extra, as the service environment service encounter
This research discusses the rehabilitation of heritage markets in the historical centers of Islamic Arab cities and their use in the field of cultural tourism as one of the most important tourist attractions and the subsequent revival of the national economy in addition to preserving the urban heritage as these markets part of the historical centers of cities. The research also discusses the preservation of the continuity of heritage markets as a product of cultural heritage value within an integrated framework to preserve the urban heritage in the historic centers of cities. The study then reviews a number of experiences of Arab and Islamic countries in the field of preserving and rehabilitating heritage markets, which qualify them to b
... Show MoreNowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More