Phonetics has close relevance with Musicology; in this study I decided explaining the interlinkages and harmony between Phonetics and Musicology. Linguists preceded philosophers in an attempt to link Phonetics with Musicology; the 1st serious attempt to link Phonetics with Musicology was done by Ibn Jeny (Dead 392 IC), but the real attempt is found with Farabi through his book under title Al Musiqa Al Kabeer, he defined music and link it with tune and relation between melody and tone, This is the same as pointed out by Ikhwan Al Safa who followed the doctrine of al-Farabi, their attention was with music and link it with phoneme, as they made music independent science, and they created special mathematics rules for it. Melody in music can
... Show MoreTwo EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.
ABSTRACT
Learning vocabulary is a challenging task for female English as a foreign language (EFL) students. Thus, improving students’ knowledge of vocabulary is critical if they are to make progress in learning a new language. The current study aimed at exploring the vocabulary learning strategies used by EFL students at Northern Border University (NBU). It also aimed to identify the mechanisms applied by EFL students at NBU University to learn vocabulary. It also aimed at evaluating the approaches adopted by EFL female students at Northern Border University (NBU) to learn a language. The study adopted the descriptive-analytical method. Two research instruments were developed to collect data namely, a survey qu
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreBackground: The ideal force-delivery system must: provide optimal tooth moving forces that elicit the desired effects, be comfortable and hygienic for the patient, require minimal operator manipulation and patient cooperation and provide rapid tooth movement with minimal mobility during orthodontic therapy, the elastomeric chains have the greatest potential to fulfill these requirements. Materials and Methods: This in vitro study was designed to determine the effect of three different mechanisms for canine retraction : (6-3 , 6-5-3 and chain loop ) on the load relaxation behavior of three types of elastomeric chains : (maximum clear , maximum silver and extreme silver) from the same company (Ortho Technology company) with two different bran
... Show MoreInternational news websites, including Russia Today, pay special attention to the media image of Afghan women, especially after the Taliban movement took control of Afghanistan. Therefore, it was necessary to know the image of the Afghan woman, the fate of the rights she acquired in recent years, and the transformations that affected her after the Taliban took control of the government, and studied them on international news sites, specifically Russia Today.
The researcher summarized the problem of this study in the following question: What is the media image of the Afghan woman on the Russia Today news site?
... Show More
The researcher has studied in his research (International Public Relations methods in building the state's image through Cyberspace)
, analytical study of the Facebook and twitter pages for British foreign office , the role was played by the International Public Relations in building the mental image of British , especially after the new media and internet have became influential role in political life . and became an important tools used by political institutions as ministries of foreign affairs in the twenty: one century .
The researcher identified the problem of this study with the following question:
(what is the role of the International Public Relations in building the mental image of state through Cyberspace)
To answer
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show More