Media and communication's research are varied in accordance to research approaches' variety which seeks to reach convergent social, psychological, political, economic, and technical point of views. Its main aim is to assimilate all the new variables in the communicative method, especially, social media sites research; concerning their methodology, tools and theories. It is due to their diverse - developed applications and their increased rates of public use becoming irreplaceable in our daily life. It is well reflected by their consequent impact on the the public beside their role in changing its views.
This clarifies the notable increase of scientific research that concern them manifesting the dialectica
... Show MoreAThe Bridge Maintenance Management System (BMMS) is an application system that uses existing data from a Bridge Management System database for monitoring and analysis of current bridges performance, as well as for estimating the current and future maintenance and rehabilitation needs of the bridges. In a transportation context, the maintenance management is described as a cost-effective process to operate, construct, and maintain physical money. This needs analytical tools to support the allocation of resources, materials, equipment, including personnel, and supplies. Therefore, Geographic Information System (GIS) can be considered as one tool to develop the road and bridge maintenanc
This research including, CO3O4 was prepared by the chemical spry pyrolysis, deposited film acceptable to assess film properties and applications as photodetector devise, studying the optical and optoelectronics properties of Cobalt Oxide and effect of different doping ratios with Br (2, 5, 8)%. the optical energy gap for direct transition were evaluated and it decreases as the percentage Br increase, Hall measurements showed that all the films are p-type, the current–voltage characteristic of Br:CO3O4 /Si Heterojunction show change forward current at dark varies with applied voltage, high spectral response, specific detectivity and quantum efficiency of CO3O4 /Si detector with 8% of Br ,was deliberate, extreme value with 673nm.
... Show MoreThe current research aims to provide a conceptual and applied frame on the subject of multi- level analysis in the research of business administration. The research tries to address some of the problems that befall the preparation of research and studies at the Arab level and local level, where the unity of theory and measurement and analysis, as well as clarify the various types of conceptual constructs and give researchers the ability to distinguish different models related to the level of analysis. On the other hand, this research provides an example of
... Show MoreIf the Industrial Revolution has enabled the replacement of humans with machines, the digital revolution is moving towards replacing our brains with artificial intelligence, so it is necessary to consider how this radical transformation affects the graphic design ecosystem. Hence, the research problem emerged (what are the effects of artificial intelligence on graphic design) and the research aimed to know the capabilities and effects of artificial intelligence applications in graphic design, and the study dealt in its theoretical framework with two main axes, the first is the concept of artificial intelligence, and the second is artificial intelligence applications in graphic design. The descriptive approach adopted a method of content
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More