Preferred Language
Articles
/
abaa-170
The Persuasive Methods of ISIS in Recruiting Individuals (Scientific Approach)
...Show More Authors

The rapid success and the field dilation of Daish organization in both Iraq and Syria make academic institutes and research centers to pay attention to its propaganda means to gain its public opinion, and to further investigation about new methods employed by this organization to disseminate its messages to the public, particularly young people in large areas of the world. This organization uses traditional propaganda techniques on psychological war and its levels, social network sites and platforms that are distributed online. This study seeks to expose more persuasive methods used by the organization to gain multiple classes of society and to disseminate its extremist ideological thoughts. It also studies the psychological operation and mental deception to achieve its goals and strengthens its presence on the occupied areas. This research also focuses on other Daish’s propaganda efforts comparable with the deceptive nature of such terrorist organizations, generally like propaganda of clash between the groups or different social classes, agitation of enthusiasm passion, the use of new electronic technologies of illustration to increase the psychological impact depending on the expertise and funds are obtained in different ways. The study found a number of conclusions, including:
The study concludes with the following results:
1- Daish organization realizes the importance and power of media to gain public opinion, supporters and sympathizers since the beginning of its appearance representative by Abu Musab al-Zarqawi
2- Daish has additional power factors after its dilation and occupied cities in Iraq and Syria as a result of the growth of its financial resources and it polarizes new technical experts.
3-The propaganda system of Daish uses various recruit techniques and psychological operations to make youth, women and children be involved to expand its supporters by which it implement special armed operations
4- Daish has used the preachers, imams of mosques, social networking sites, info graphics, and electronic forums as a means to implicate recruits and teach them ways of belonging to this organization as well as how to make explosives via the internet.
5- It owns several propaganda arms forming the skeleton of its electronic arms including productive and audio-visual centers as well as publications like Dabiq magazine, Alshamilha magazine, and Khansa magazine.
6- Daish organization depends not only on mass communication through its new and traditional means, but also uses direct means of persuasions by training preachers and some individual practices to raise enthusiasm and passion by using the normal cassette or compact disk ( CD).
7- It uses the deceptive style and bright words to create a historical depth of its formation and show an alleged link of caliphate with the Islamic caliphate in the era of the Prophet Muhammad and his Caliphs.
8- Daish relies on persuasive techniques of psychology in order to lure young people and women, to recruit its supporters.
9- Daish shows the children, who call them cubs caliphs, in its propaganda through a series of short films. These cubs› caliphs are involved in military, field, and psychological training programs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Journal Of The American Geriatrics Society
A Systems Approach to Identify Factors Influencing Adverse Drug Events in Nursing Homes
...Show More Authors

The objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association

... Show More
View Publication
Scopus (28)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Efficiency of Human Resources Information System and Its Impact on The Level Effectiveness of Employees Performance Appraisal System / Practical Research on Ministry of Higher Education and Scientific Research
...Show More Authors

Abstract

The research aims to determine the role of the efficiency of Human Resources Information System in the effectiveness of Employees Performance Appraisal System in the Ministry of Higher Education and Scientific Research / Center for the ministry, it was touching the researchers need the ministry to devise methods that employ outputs Human Resources Information System in the organization surveyed for the development of methods and levels of process evaluate the performance of its employees, in order to identify the extent of the role played by human resources information system in the process of assessing the performance of employees, we raised the question of the President as follows:

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Maximum Likelihood and Bayesian Methods For Estimating The Gamma Regression With Practical Application
...Show More Authors

In this paper, we will illustrate a gamma regression model assuming that the dependent variable (Y) is a gamma distribution and that it's mean ( ) is related through a linear predictor with link function which is identity link function g(μ) = μ. It also contains the shape parameter which is not constant and depends on the linear predictor and with link function which is the log link and we will estimate the parameters of gamma regression by using two estimation methods which are The Maximum Likelihood and the Bayesian and a comparison between these methods by using the standard comparison of average squares of error (MSE), where the two methods were applied to real da

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 14 2024
Journal Name
Aip Conference Proceedings
Segmentation Moon Images Using Different Segmentation Methods and Isolate the Lunar Craters
...Show More Authors

Segmentation is the process of partition digital images into different parts depending on texture, color, or intensity, and can be used in different fields in order to segment and isolate the area to be partitioned. In this work images of the Moon obtained through observations in Astronomy and space dep. College of science university of Baghdad by ( Toward space telescopes and widespread used of a CCD camera) . Different segmentation methods were used to segment lunar craters. Different celestial objects cause craters when they crash into the surface of the Moon like asteroids and meteorites. Thousands of craters appears on the Moon's surface with ranges in size from meter to many kilometers, it provide insights into the age and ge

... Show More
Scopus (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Efficient computational methods for solving the nonlinear initial and boundary value problems
...Show More Authors

Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Apr 21 2023
Journal Name
Aip Conference Proceedings
Efficient computational methods for solving the nonlinear initial and boundary value problems
...Show More Authors

In this paper, three approximate methods namely the Bernoulli, the Bernstein, and the shifted Legendre polynomials operational matrices are presented to solve two important nonlinear ordinary differential equations that appeared in engineering and applied science. The Riccati and the Darcy-Brinkman-Forchheimer moment equations are solved and the approximate solutions are obtained. The methods are summarized by converting the nonlinear differential equations into a nonlinear system of algebraic equations that is solved using Mathematica®12. The efficiency of these methods was investigated by calculating the root mean square error (RMS) and the maximum error remainder (𝑀𝐸𝑅n) and it was found that the accuracy increases with increasi

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 14 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Segmentation moon images using different segmentation methods and isolate the lunar craters
...Show More Authors

Segmentation is the process of partition digital images into different parts depending on texture, color, or intensity, and can be used in different fields in order to segment and isolate the area to be partitioned. In this work images of the Moon obtained through observations in Astronomy and space dep. College of science university of Baghdad by ( Toward space telescopes and widespread used of a CCD camera) . Different segmentation methods were used to segment lunar craters. Different celestial objects cause craters when they crash into the surface of the Moon like asteroids and meteorites. Thousands of craters appears on the Moon's surface with ranges in size from meter to many kilometers, it provide insights into the age and geology

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Three Weighted Residuals Methods for Solving the Nonlinear Thin Film Flow Problem
...Show More Authors
Abstract<p>In this paper, the methods of weighted residuals: Collocation Method (CM), Least Squares Method (LSM) and Galerkin Method (GM) are used to solve the thin film flow (TFF) equation. The weighted residual methods were implemented to get an approximate solution to the TFF equation. The accuracy of the obtained results is checked by calculating the maximum error remainder functions (MER). Moreover, the outcomes were examined in comparison with the 4<sup>th</sup>-order Runge-Kutta method (RK4) and good agreements have been achieved. All the evaluations have been successfully implemented by using the computer system Mathematica®10.</p>
View Publication
Crossref (1)
Crossref
Publication Date
Thu Nov 13 2025
Journal Name
Jornal Of Al-muthanna For Agricultural Sciences
A Proposed Approach to Agricultural Extension in Iraq for a Better Response to the Needs of farmer’s to Address Their Challenges
...Show More Authors

View Publication