The provided research paper offers a thorough analysis of the semiotic analysis present in tobacco-free initiative advertisements from the year 2021. The study delves into the intricate process of decoding the diverse signs, symbols, and visual components integrated into these anti-smoking campaigns. The core aim of this investigation is to comprehend and explore the semiotic tactics that underlie these advertisements, with a particular emphasis on visual communication as a pivotal tool in shaping the public's attitudes and behaviors towards tobacco usage. The research introduces a significant theoretical framework, the "Taxonomy of Image-Text Relations and Functions" theory, as proposed by Emily E. Marsh and Marilyn Dom
... Show Morepatterns of utterance stress in discourse direct attention to specific themes and reactions, controlling the flow and coherence of conversation. this study examines the utterance stress in Steve Harvey's selected episodes from a phono-stylistic perspective. this study is hoped to improve understanding of linguistic mechanism in talk show communication, highlighting the importance of phonetic features in transmitting meaning and increasing broadcast conversation participation. the researcher concentrates on the types of focus functions of utterance stress of some episodes available on YouTube. to conduct the analysis, the researcher adopts (Carr, 2013; Davenport& Hannahs 2005) to analyze utterance stress and Leech and Short (2007
... Show More
|
The dividends is one of difficult and important decisions taken by the administration in the economic units, because this decision has a direct impact on the investor and economic unit, so the main objective of any investor is achieve earnings, as well as information borne by dividends about the earnings quality of the economic unit and the level and efficiency of management to achieving earnings.
The research aims at explaining the effect of the dividends policy on the earnings quality in the companies listed in the Iraq Stock Exchange. The Miller model was used to measu
... Show MoreABSTRACT
This study aimed to choose top stocks through technical analysis tools specially the indicator called (ratio of William index), and test the ability of technical analysis tools in building a portfolio of shares efficient in comparison with the market portfolio. These one technical tools were used for building one portfolios in 21 companies on specific preview conditions and choose 10 companies for the period from (March 2015) to (June 2017). Applied results of the research showed that Portfolio yield for companies selected according to the ratio of William index indicator (0.0406) that
... Show MoreA simple physical technique was used in this study to create stable and cost-effective copper oxide (CuO) nanoparticles from pure copper metal using the pulsed laser ablation technique. The synthesis of crystalline CuO nanoparticles was confirmed by various analytical techniques such as particle concentration measurement using atomic absorption spectrometry (AAS), field emission scanning electron microscopy (FE-SEM), the energy dispersive X-ray (EDX), and X-ray diffraction (XRD) to determine the crystal size and identify of the crystal structure of the prepared particles. The main characteristic diffraction peaks of the three samples were consistent. The corresponding 2θ is also consistent, and the cytotoxicity of the nanoparticles was
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show More