The paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah).
The paper is descriptive following the survey approach and data analysis approach.
The paper has come up with the following findings:
1. The Terrorist Organizations Al Qaeda and ISIS used twelve promoting methods in the opening articles of the E-Newspapers; the emotional empathy method comes top among them.
2. They utilized the International World Web (Internet) to promote their methods and thinking via E-newspapers.
Background : Xanthomatosis is a disease in which large tendon tumors can occur, especially in the Achilles tendon. This disease is a rare interesting orthopaedic condition. Case Report:A case of a twenty eight year old girl patient with giant bilateral Achilles tendon xanthomas in which both tumors were resected. There was no ulceration on the both sides. The patient was treated by total resection of the lesion and reconstruction using tendon transfer of the Peroneus brevis and Flexor hallusis longus. Postoperative treatment consisted of six weeks lower leg cast immobilization followed by partial weight bearing. After 4 months the patient was able to walk pain free without any difficulties. It has been suggested that total resection with au
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreBackground : Xanthomatosis is a disease in which large tendon tumors can occur, especially in the Achilles tendon. This disease is a rare interesting orthopaedic condition.
Case Report:A case of a twenty eight year old girl patient with giant bilateral Achilles tendon xanthomas in which both tumors were resected.
There was no ulceration on the both sides. The patient was treated by total resection of the lesion and reconstruction using tendon transfer of the Peroneus brevis and Flexor hallusis longus. Postoperative treatment consisted of six weeks lower leg cast immobilization followed by partial weight bearing. After 4 months the patient was able to walk pain free without any difficultie
... Show MoreBackground: Giant middle cerebral artery (MCA) aneurysms are surgically challenging lesions. Because of the complexity and variability of these aneurysms, a customized surgical technique is often needed for each case. In this article, we present a modified clip reconstruction technique of a ruptured complex giant partially thrombosed middle cerebral artery aneurysm.
Case description: The aneurysm was exposed using the pterional approach. Following proximal control, the aneurysm sac was decompressed. Then, we applied permanent clips to reconstruct the aneurysm neck. The configuration of the aneurysm mandated a tailored clipping pattern to account for resi
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreMany cities suffer from the large spread of slums, especially the cities of the Middle East. The purpose of the paper is to study the reality of informal housing in Al-Barrakia and the most important problems that it suffers from. The paper also seeks to study the presence or absence of a correlation between urban safety indicators and urban containment indicators as one of the methods of developing and planning cities. This can be achieved through sustainable urban management. The slums are a source of many urban problems that threaten the security and safety of the residents and represent a focus for the concentration of crimes and drugs. The paper seeks to answer the following question: How can urban safety be improved through urban cont
... Show MoreIntestinal parasites present in freshwater from the Al- Fallujah, Al- Habbaniyah and Al-Alwarar, of the Euphrates river in Iraq are Cryptosporidium spp (25.3%), Giardia sp (3.3%), Eimeria sp (3.3%), Pinworm eggs (3.3%), Naegleria sp (15.3%), Lecane niwati (1.3%), Trichomonas hominis (19.3%), Acanthamoeba spp (24.6%), Entamoeba coli (20.6%), Balantidium coli (12%), Ascaris sp (3.3%), Volvox sp (26%), Chilomastix mesnili (4%), Pelomyxa palustris (2.6%), Trinema enchelys (2.6%), Actinophrys Sol (7.3%), Amobea Vespertilio (9.3%), Rhabditea (5.3%), paramecium bursaria (9.3%), cyst of cestode (6%), Oocyst protozoa (16%), Euglena gracilis (10.6%).were isolated. The study's goal was to isolate some of the parasites that pollute the Euphrat
... Show MoreIn order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.
This research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type (5052-O).
The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot. &nbs
... Show More