The study of the " Speech act " in grammatical codes reveals great efforts in the study of the elements of linguistic communication contained in their efforts, and is part of the study of the linguistics of heritage, and the research has been designed to identify the verbal act in the blog of Ibn al-Khabaz (guiding the shine) by studying its sections comprehensively; To the spirit of grammatical discourse as well as the combination of the concept of the semantic act already verbal according to Searle, and its response in the form of indirect verbal acts more than direct acts, as well as the pure formulas of the opinions of the violators in the speech of Ibn al-Khabaz other than the proven verbal formulas Approval and approval, the class
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreIdentification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit
... Show MoreThe Braille Recognition System is the process of capturing a Braille document image and turning its content into its equivalent natural language characters. The Braille Recognition System's cell transcription and Braille cell recognition are the two basic phases that follow one another. The Braille Recognition System is a technique for locating and recognizing a Braille document stored as an image, such as a jpeg, jpg, tiff, or gif image, and converting the text into a machine-readable format, such as a text file. BCR translates an image's pixel representation into its character representation. As workers at visually impaired schools and institutes, we profit from Braille recognition in a variety of ways. The Braille Recognition S
... Show MoreIn this study was undertaken frish fish such as Bigeye Ilisha megaloptera, Nematalos nasus, Suboor Hilsha ilisha and Carp Cyprinus carpio. they were purchased from local marketes in Basrah, Oil was extracted by a solvent extraction method on low temperature. And the level of oil obtiened about (6.08; 10.72; 13.52 and 5.61)% for Bigeye, Jaffout, Suboor and Carp. the Crud oils were compared with vegetable oil (olive oil) and animal fat (tial fat mutton).
The extracted oil from fresh complete fishs with compared oils intraed on pharmacological system through packed in capsul with and with out garlic`s extract. this system analysis with chemical tests.
Results were analyzed statistically by using the SPSS program with using (CRD)
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of whi
... Show MorePolitical speeches are represented in different shapes as political forum, events or as inaugural speech. This research critically analyzes the inaugural Speech of the President Donald Trump which was delivered on 20th ,January, 2017 from the site<www.cnn.com> retrieved on 10th ,May,2017. The objectives of the study are: First: classifying and discussing well known micro structures (linguistic feature) of the speech, and second: classifying the macro structures i.e. the delivered political inaugural speech in which he includes social structures. To reach to the objectives of the study, the researcher will adopt Norman Fairclough’s three dimensional Analytical Model(1989). Tracing the model, the speech was subm
... Show MorePolitical speeches are represented in different shapes as political forum, events or as inaugural speech. This research critically analyzes the inaugural Speech of the President Donald Trump which was delivered on 20th ,January, 2017 from the site<www.cnn.com> retrieved on 10th ,May,2017. The objectives of the study are: First: classifying and discussing well known micro structures (linguistic feature) of the speech, and second: classifying the macro structures i.e. the delivered political inaugural speech in which he includes social structures. To reach to the objectives of the study, the researcher will adopt Norman Fairclough’s three dimensional Analytical Model(
... Show MoreHowever, the effects of these ideas are still evident
Think of those who follow the footsteps of Muslim scholars and thinkers.
Intellectual source of Gnostic Gnar
And in dealing with issues of Islamic thought
Annalisa intersecting trends of thought, Minya who melts in Masarya and supported him and believes in Bo and extremist Vue,
Lea, trying to throw it with a few times, looks at Elya look
There are those who stand in the opposite position
There are those who stand in a selective compromise, but this school of thought remains
G - the features of Islamic thought that believes in the mind and Imoto in the defense of
An intellectual station and generalized bar
Creed. In his study, the researcher wi