The rapid success and the field dilation of Daish organization in both Iraq and Syria make academic institutes and research centers to pay attention to its propaganda means to gain its public opinion, and to further investigation about new methods employed by this organization to disseminate its messages to the public, particularly young people in large areas of the world. This organization uses traditional propaganda techniques on psychological war and its levels, social network sites and platforms that are distributed online. This study seeks to expose more persuasive methods used by the organization to gain multiple classes of society and to disseminate its extremist ideological thoughts. It also studies the psychological operation and mental deception to achieve its goals and strengthens its presence on the occupied areas. This research also focuses on other Daish’s propaganda efforts comparable with the deceptive nature of such terrorist organizations, generally like propaganda of clash between the groups or different social classes, agitation of enthusiasm passion, the use of new electronic technologies of illustration to increase the psychological impact depending on the expertise and funds are obtained in different ways. The study found a number of conclusions, including:
The study concludes with the following results:
1- Daish organization realizes the importance and power of media to gain public opinion, supporters and sympathizers since the beginning of its appearance representative by Abu Musab al-Zarqawi
2- Daish has additional power factors after its dilation and occupied cities in Iraq and Syria as a result of the growth of its financial resources and it polarizes new technical experts.
3-The propaganda system of Daish uses various recruit techniques and psychological operations to make youth, women and children be involved to expand its supporters by which it implement special armed operations
4- Daish has used the preachers, imams of mosques, social networking sites, info graphics, and electronic forums as a means to implicate recruits and teach them ways of belonging to this organization as well as how to make explosives via the internet.
5- It owns several propaganda arms forming the skeleton of its electronic arms including productive and audio-visual centers as well as publications like Dabiq magazine, Alshamilha magazine, and Khansa magazine.
6- Daish organization depends not only on mass communication through its new and traditional means, but also uses direct means of persuasions by training preachers and some individual practices to raise enthusiasm and passion by using the normal cassette or compact disk ( CD).
7- It uses the deceptive style and bright words to create a historical depth of its formation and show an alleged link of caliphate with the Islamic caliphate in the era of the Prophet Muhammad and his Caliphs.
8- Daish relies on persuasive techniques of psychology in order to lure young people and women, to recruit its supporters.
9- Daish shows the children, who call them cubs caliphs, in its propaganda through a series of short films. These cubs› caliphs are involved in military, field, and psychological training programs.
Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show MoreStereolithography (SLA) has become an essential photocuring 3D printing process for producing parts of complex shapes from photosensitive resin exposed to UV light. The selection of the best printing parameters for good accuracy and surface quality can be further complicated by the geometric complexity of the models. This work introduces multiobjective optimization of SLA printing of 3D dental bridges based on simple CAD objects. The effect of the best combination of a low-cost resin 3D printer’s machine parameter settings, namely normal exposure time, bottom exposure time and bottom layers for less dimensional deviation and surface roughness, was studied. A multiobjective optimization method was utilized, combining the Taguchi me
... Show MoreAbstract
The grey system model GM(1,1) is the model of the prediction of the time series and the basis of the grey theory. This research presents the methods for estimating parameters of the grey model GM(1,1) is the accumulative method (ACC), the exponential method (EXP), modified exponential method (Mod EXP) and the Particle Swarm Optimization method (PSO). These methods were compared based on the Mean square error (MSE) and the Mean Absolute percentage error (MAPE) as a basis comparator and the simulation method was adopted for the best of the four methods, The best method was obtained and then applied to real data. This data represents the consumption rate of two types of oils a he
... Show MoreThis research aims to examine the relationship between learning organization and behavior of work teams. The variable of the learning organization took four dimensions depending on the study (sudhartna & Li, 2004): Common cultural values , communication, knowledge transfer and the characteristics of workers. The behavior of teams was identified on the basis of realizing of the respondents of their organization to work as a team where the research relied concepts applied in the study (Hakim , 2005) , and chose to research the case of a service organization for the study and relied on four dimensions of coordination , cooperation , sharing of information , the performance of the team, and was a curriculum approach and des
... Show More