This study aims to observe and analysis the propaganda discourse image for Daesh, and know how it marketing the fear due to symbols structure, and discover the straight meanings and hidden inspiration, with the ideology that the image presented.
The study is descriptive and qualitative, and the method is analytic survey used semiotic approach.
The most important results of the study refer to:
- Daesh functioning the image in fear manufacture in all it components: the symbol of savageness, body language, color, clothes uniform and professionally shot.
- The indicative meaning of fear promoted by Daesh based of the manufacturing «Holy», and that mean places non-touchable and non-insulted.
- Daesh used in its propaganda image discourse all methods of violence for fear manufacture: direct, verbal and symbol violence.
Ecosystems provide humans with services that include benefits from food, fresh water, climate regulation, and socio-economic assets. The Mesopotamian marshlands are among the largest wetlands in the Middle East and they provide various benefits. However, ecosystem services of the Marshlands are consistently undervalued in national economic analysis and decision making. This study focusses on the Central Marshes, the first National Park in Iraq, and is the first attempt at valuing a series of ecosystem services from a valuable natural ecosystem in Iraq. We adopted the Toolkit for Ecosystem Services Site-Based Assessment (TESSA) for the determination of biophysical and economic values of services at the site level. Data on key ecosystem se
... Show MoreA theoretical analysis of mixing in the secondary combustion chamber of ramjet is presented. Theoretical investigations were initiated to insight into the flow field of the mixing zone of the ramjet combustor and a computer program to calculate axisymmetric, reacting and inert flow was developed. The mathematical model of the mixing zone of ramjet comprises differential equations for: continuity, momentum, stagnation enthalpy, concentration, turbulence energy and its dissipation rate. The simultaneous solution of these equations by means of a finite-difference solution algorithm yields the values of the variable at all internal grid nodes.
The results showed that increasing air mass flow (0.32 to 0.64 kg/s) increases the development o
Chest X-rays have long been used to diagnose pneumothorax. In trauma patients, chest ultrasonography combined with chest CT may be a safer, faster, and more accurate approach. This could lead to better and quicker management of traumatic pneumothorax, as well as enhanced patient safety and clinical results.
The purpose of this study was to assess the efficacy and utility of bedside US chest in identifying traumatic pneumothorax and also its capacity to estimate the extent of the lesion in comparison to the gold standard modality chest computed tomography.
Raghad Fattah RADHI
Lately great interests have emerged to find educational alternatives to teach and improve motor skills according to modern educational methods that take into account individual differences and speed in learning for the learner through individual learning that the learner adopts by teaching himself by passing through various educational situations to acquire skills and information in the way he is The learner is the focus of the educational process and among these alternatives the interactive video, the researchers noted through the educational training units at the Model Squash School of the Central Union, and that most of the methods and methods used in learning basic skills take a lot of time in the educational program and do not involve
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe current study aimed to identify the role of the theatrical technical supervisor in developing and enhancing the skills of middle school students in Baghdad. The sample consisted of 73% of the original community of theatrical technical supervisors, randomly selected from those working in the first, second, and third educational directorates in the Rassafa and Karkh areas. The sample size was 32 theatrical technical supervisors. The study used a questionnaire to collect data on three axes: the cognitive skills developed by the theatrical technical supervisor, the voice and speech skills developed by the supervisor, and the body movement skills developed by the supervisor. The results showed that the theatrical technical supervisor play
... Show MoreIn this paper, the penetration of the stone column was investigated in order to get the minimum length of the stone column above which the increase in length has little advantage. The effect of using different materials in column are also studied. The material used is granular of different angle of internal friction (). The results of the investigation indicated that the effect of stone column remains constant when the ratio of the thickness of the soft clay layer to the stone column’s diameter is more than 15. The results also indicated that a pronounced effect is obtained when the angle of internal friction of the stone column material is increased.