The rapid success and the field dilation of Daish organization in both Iraq and Syria make academic institutes and research centers to pay attention to its propaganda means to gain its public opinion, and to further investigation about new methods employed by this organization to disseminate its messages to the public, particularly young people in large areas of the world. This organization uses traditional propaganda techniques on psychological war and its levels, social network sites and platforms that are distributed online. This study seeks to expose more persuasive methods used by the organization to gain multiple classes of society and to disseminate its extremist ideological thoughts. It also studies the psychological operation and mental deception to achieve its goals and strengthens its presence on the occupied areas. This research also focuses on other Daish’s propaganda efforts comparable with the deceptive nature of such terrorist organizations, generally like propaganda of clash between the groups or different social classes, agitation of enthusiasm passion, the use of new electronic technologies of illustration to increase the psychological impact depending on the expertise and funds are obtained in different ways. The study found a number of conclusions, including:
The study concludes with the following results:
1- Daish organization realizes the importance and power of media to gain public opinion, supporters and sympathizers since the beginning of its appearance representative by Abu Musab al-Zarqawi
2- Daish has additional power factors after its dilation and occupied cities in Iraq and Syria as a result of the growth of its financial resources and it polarizes new technical experts.
3-The propaganda system of Daish uses various recruit techniques and psychological operations to make youth, women and children be involved to expand its supporters by which it implement special armed operations
4- Daish has used the preachers, imams of mosques, social networking sites, info graphics, and electronic forums as a means to implicate recruits and teach them ways of belonging to this organization as well as how to make explosives via the internet.
5- It owns several propaganda arms forming the skeleton of its electronic arms including productive and audio-visual centers as well as publications like Dabiq magazine, Alshamilha magazine, and Khansa magazine.
6- Daish organization depends not only on mass communication through its new and traditional means, but also uses direct means of persuasions by training preachers and some individual practices to raise enthusiasm and passion by using the normal cassette or compact disk ( CD).
7- It uses the deceptive style and bright words to create a historical depth of its formation and show an alleged link of caliphate with the Islamic caliphate in the era of the Prophet Muhammad and his Caliphs.
8- Daish relies on persuasive techniques of psychology in order to lure young people and women, to recruit its supporters.
9- Daish shows the children, who call them cubs caliphs, in its propaganda through a series of short films. These cubs› caliphs are involved in military, field, and psychological training programs.
In this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using
In this paper, the computational method (CM) based on the standard polynomials has been implemented to solve some nonlinear differential equations arising in engineering and applied sciences. Moreover, novel computational methods have been developed in this study by orthogonal base functions, namely Hermite, Legendre, and Bernstein polynomials. The nonlinear problem is successfully converted into a nonlinear algebraic system of equations, which are then solved by Mathematica®12. The developed computational methods (D-CMs) have been applied to solve three applications involving well-known nonlinear problems: the Darcy-Brinkman-Forchheimer equation, the Blasius equation, and the Falkner-Skan equation, and a comparison between the met
... Show MoreIn this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using
The educational sector is one of the important sectors in the world, and it is considered one of the means of community development. In addition, it is one of the means of making the country’s renaissance and devel-opment because it represents the factory of thinking minds that make change. There is no doubt that this sector is the same as any other sector. The deficit in the studied scientific planning has been prolonged, which led to its deterioration, and the problems of education remain diverse and inherited from previous time periods, where the hierarchical cluster analysis was used on postgraduate students in universities in Iraq, except for Kurdistan region, and the number of universities that were included in the study was
... Show MoreIn this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.
In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreThis paper is dealing with non-polynomial spline functions "generalized spline" to find the approximate solution of linear Volterra integro-differential equations of the second kind and extension of this work to solve system of linear Volterra integro-differential equations. The performance of generalized spline functions are illustrated in test examples
To evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult
... Show More