This article discusses the function of semiotics in political discourse after the socio-political processes taking place in Iraq since 2003 and its role in the development of textual criticisms of some Iraqi politicians, analyzes the reasons for its functioning in the speech of politicians. The research is mainly focused on finding out to what extent political text studies draw on sign systems that can store and transmit information, the nature of its purpose and the use of available fields for the purpose to be achieved. The chief purpose of the study is to investigate and also clarify the symbols and signs appear within the framework of discursive Iraqi politicians, the nature of the symbols used, and the meanings that are included in the discourse in terms of structure, context, and form. Moreover, it has been attempted to define semiotic features in the texts of Iraqi politicians; and elicit structure, style and wording, and the degree of convergence of meaning and form in the semiotic application.
A solar cell was manufactured from local materials and was dyed using dyes extracted from different organic plants. The solar cell glass slides were coated with a nano-porous layer of Titanium Oxide and infused with two types of acids, Nitric acid and Acetic acid. The organic dyes were extracted from Pomegranate, Hibiscus, Blackberry and Blue Flowers. They were then tested and a comparison was made for the amount of voltage they generate when exposed to sunlight. Hibiscus sabdariffa extract had the best performance parameters; also Different plants give different levels of voltage.
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut
... Show MoreScheduling Timetables for courses in the big departments in the universities is a very hard problem and is often be solved by many previous works although results are partially optimal. This work implements the principle of an evolutionary algorithm by using genetic theories to solve the timetabling problem to get a random and full optimal timetable with the ability to generate a multi-solution timetable for each stage in the collage. The major idea is to generate course timetables automatically while discovering the area of constraints to get an optimal and flexible schedule with no redundancy through the change of a viable course timetable. The main contribution in this work is indicated by increasing the flexibility of generating opti
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreJumping ability is a fundamental variable in many sports, as its execution requires an integration of muscular strength Q1 and certain biomechanical variables. This is particularly evident in gymnastics jumping events and jump shots in ball games, both of which rely on a high level of vertical resistance. Vertical resistance serves as an indicator of an athlete’s ability to overcome their body weight while counteracting gravitational force to achieve optimal performance. As such, it is considered one of the key factors in movements that demand explosive power and speed. The researchers believe that despite the significant relationship between vertical resistance, speed-strength of the arms and legs, and certain biomechanical varia
... Show MoreIn the tenth century, Turks began to convert into Islam and adopted for official and literary use the Arabic language to study the teachings of the new religion they believed in. The use of many of the loanwords have become absolute in the Ottoman period, but even in Modern Turkish a large number of loanwords from Arabic can be often recognized because they are not subject to the strict rules of Turkish. Yet, some of these words lost its original meaning and acquired new different Turkish meaning. Moreover, some of the Arabic nouns of singular form in Turkish, modified the plural Turkish form. The present study entitled “the adaptation and the different modifications of borrowed Arabic Plurals in Modern Turkish” sheds light on
... Show MoreThe article considers semantic and stylistic motivations for using obsolete lexicon (historicisms) in the text of a work of art. The specifics of the functioning of this process are presented against the background of the features of the contemporary Russian literary language. Attention is focused on the fact that the layer of obsolete lexical units belongs to a number of nationally specific vocabulary, the development of which forms an understanding of the nature of the actualized language. In addition, it should be noted that the semantics of historicisms is culturally commensurate: the latter is explained by the fact that the deactuation of linguistic units is positioned as parallel to the sociocultural and political changes.
... Show More