This paper deals with a central issue in the field of human communication and reveals the roaming monitoring of the incitement and hatred speech and violence in media, its language and its methods. In this paper, the researcher seeks to provide a scientific framework for the nature of the discourse of incitement, hatred speech, violence, and the role that media can play in solving conflicts with their different dimensions and in building community peace and preventing the emergence of conflicts among different parties and in different environments. In this paper, the following themes are discussed:
The root of the discourse of hatred and incitement
The nature and dimensions of the discourse of incitement and hatred speech
The negative roles of the contents of letters of incitement and hatred speech, hate and violence
Language and incitement, hatred and violence
Language features in hatred speech
Hate and incitement speech in the internet
This study titled “digital addiction and its relationship to social isolation among children in the autism spectrum from the point of view of their parents” in which the
researcher addressed an important topic which is knowledge of digital addiction in a
child with autism spectrum and its relationship to social isolation in them.
The study aimed to dhed the light on the digital addiction in a spectrum child Autism
from the point of view of their parents، by knowing the extent of addiction of children
in the autism spectrum، and identifying the relationship between electronic addiction and the social isolation of children in the autism spectrum.The study presented
several hypotheses،
A New Perspective About Masculinity and the Issue of Identity in Ernest Hemingway's The Old Man and The Sea and Michael Ondaatje's in The Skin of a lion
This research paper studies the alienation of the intellectuals in the modern novel through the study of two alienated characters, John Marcher in Henry James's The Beast in the Jungle, and Mr. Duffy in James's Joyce's "A Painful Case." As a result of the complexity of life in the industrial societies, the individuals, especially the intellectual ones, feel themselves unable to integrate into social life; they fear society and feel that it endangers their individuality and independence. Thus, these characters live on the fringe of the societ
... Show MoreA land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu
... Show MoreBackground: Type two diabetic patients have higher risk of cardiovascular and periodontal disease. Furthermore, patients with more severe periodontal disease have higher incidence of cardiovascular disease. This study aimed to assess the association between periodontal health status and the risk of vascular disease in type 2 diabetic patients. Materials and Methods: One hundred type 2 diabetes mellitus patients and fifty apparently healthy males were enrolled in this study. Oral examinations conducted were; plaque Index, calculus index, gingival index, probing pocket depth, and clinical attachment level. For the assessment of vascular risk, arterial stiffness index was used. Results: According to arterial stiffness index, type 2 diabetic p
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThe Hubble telescope is characterized by the accuracy of the image formed in it, as a result of the fact that the surrounding environment is free of optical pollutants. Such as atmospheric gases and dust, in addition to light pollution emanating from industrial and natural light sources on the earth's surface. The Hubble telescope has a relatively large objective lens that provides appropriate light to enter the telescope to get a good image. Because of the nature of astronomical observation, which requires sufficient light intensity emanating from celestial objects (galaxies, stars, planets, etc.). The Hubble telescope is classified as type of the Cassegrain reflecting telescopes, which gives it the advantage of eliminating chromat
... Show MoreFluidization process is widely used by a great assortment of industries worldwide and represents a trillion dollar industry [6]. They are currently used in separation, classification, drying and mixing of particles, chemical reactions and regeneration processes; one of these processes is the mass transfer from an immersed surface to a gas fluidized bed