The platforms of social networking sites, with their distinctive communication and technological features, create a social movement that led to the establishment of a new pattern of communication in a modern context. This allows the users on the internet to carry out many social interactions based on the interests and commonalities among them. Algerian women have a share of this digital presence by representing their views and discussing their issues on several sites like Facebook, for example.
In this research, we have analyzed the pages of Algerian women on Facebook site to find out the most important issues addressed by Algerian women so that we can organize their concerns in the digital channels and discover their different orientations.
ﺔﻴﻋﺍﺫﻹﺍ ﺕﺎﻴﻨﻘﺘﻟﺍ ﻡﺍﺪﺨﺘﺳﺍ ﰲ ﲑﺒﻛ ﺭﻮﻄﺗ ﻦﻣ ﻝﺎﺼﺗﻻﺍ ﺮﺼﻋ ﻩﺪﻬﺷ ﻱﺬﻟﺍ ﺖﻗﻮﻟﺍ ﰲ ﺔﻴﻧﻮﻳﺰﻔﻠﺘﻟﺍﻭ ﺍ ﺢﺴﻓ ﰲ ﻢﻬﺳﺃ ﺕﺎﻄﶈﺍ ﺀﺍﻮﺳ ﺔﻴﻧﻮﻳﺰﻔﻠﺘﻟﺍ ﺕﺍﻮﻨﻘﻟﺍ ﺚﺒﻟ ﻊﺳﺍﻮﻟﺍ ﻝﺎ ( ﺔﻴﺿﺭﻷﺍ ﺔﻴﻠﺑﺎﻜﻟﺍ ﻭﺃ ﺔﻴﺋﺎﻀﻔﻟﺍ ﻭﺃ ( ﱵﻟﺍ ﺔﺻﺎﳋﺍ ﺔﻴﺋﺎﻀﻔﻟﺍ ﺕﺍﻮﻨﻘﻟﺍ ﻦﻣ ﺪﻳﺪﻌﻟﺍ ﺭﻮﻬﻇ ﰲ ﺎﻀﻳﺃ ﺪﻋﺎﺳ ﺎﳑﻭ ، ﺕﺎﻴﺋﺎﻀﻔﻟﺍ ﺭﻮﻬﻇ ﻚﻟﺫ ﻞﺒﻗ ﺩﺎﺳ ﻥﺃ ﺪﻌﺑ ﺔﻴﻣﻮﻜﺣ ﲑﻏ ﺕﺎﻴﻌﲨ ﻭ
... Show MoreThe aim of this work is to study the factors that affect the welding joint of dissimilar metals. Austenitic stainless steel-type AISI (316L) with a thickness of (2mm) was welded to carbon steel (1mm) using an MIG spot welding. The filler metal is a welding wire of the type E80S-G (according to AWS) is used with (1.2mm) diameter and CO2 is used as shielding gas with flow rate (7L/min) for all times was used in this work.
The results indicate that the increase of the welding current tends to increase the size of spot weld, and also increases the sheer force. Whereas the sheer force increased inversely with the time of welding. Furthermore, the results indicate that i
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
تهدف الدراسة الحالية الى استعمال الانموذج اللوجستي ثنائي المعلم في تدريج مقياس الشخصية الافتراضية المتعدد الابعاد لطلبة الجامعة وفقا لنظرية الاستجابة للفقرة، والخروج بتعميم لنتائج البحث والوقوف على الاجراءات العلمية المناسبة وتوفير تطبيق عملي علمي صحيح لاعتمادها من قبل الباحثين. وقد اتبعث الباحثة الاسلوب العلمي من خطوات واجراءات في عملية بناء المقياس حيث حدت ابعاد الشخصية الافتراضية المتمثلة بسبع ابعا
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More