It has become familiar to see alchemy as a methodological approach that combines conscious, diverse, psychological, social, structural, and discrete approaches in the communications technology that Marshall McLuhan found to be able to extend our bodies and senses, The media discourse has a deep and superficial structure produced by the first, with its social, cultural and historical backgrounds, in a context that connects the image with the word, as the "meanings are made" - everywhere, as described by Jonathan ) In fashion, in the arts as a whole, and from its "signs" Our analysis of «meaning», in the media, and communication through advertising, magazines, newspapers, television, and the Internet. Therefore, alchemy is preoccupied with how the signs work, their relation to each other and to the specific community, individuals and to each variable (ethnographic), which varies according to their culture and hobby.
Which widens the field of alchemy to a wider range than its specific structure, but opens up to different codes, structures and conflicting ideologies where it reads (signs) in different ways and is compatible with other texts.
Here, the semiotics impose a special methodological adjustment, because of the clash of the many meanings, and the intersection of them in one point, and one time, which makes us pursue these meanings, flowing, to take a position, or a specific interpretation or interpretation from different reception angles to the audience of readers, In the form of analysis and synthesis, and the reintroduction of the media (incident), in the multiplication of identities, their transformations, fixed and transformative patterns, virtual and virtual self-formation with the unrealistic, ) Come on To create the human of the present century for the broadcast of new values in the media culture, and remain the active actor, between the actors of the methodology is also effective, as you intend to go into the problems, and explain one aspect of a coherent analytical approach.
Objectives: The main objective of this study is to examine the crucial role that Russian writers and intellectuals played in catalyzing the 1905 Revolution in Russia. Specifically, the study sought to analyze how their literary works, philosophical ideas, and political writings challenged Tsarist autocracy, depicted the suffering of the masses, and inspired opposition movements. The study aimed to highlight the defiant writings that contributed to the rise of political figures and the eventual overthrow of the repressive regime. Methods: The historical narrative and analytical methods were employed, conducting a comparative analysis of prominent works by renowned authors such as Tolstoy, Gorky, and Chekhov. This analysis focused on
... Show MoreReconstruction in Iraq requires coherent legitimate frameworks that are able to detail obligations, rights and responsibilities of the parties participating in reconstruction projects, regardless their type or delivery system.
Conditions of Contract can be considered an important component of these frameworks. This paper investigates flexibility and appropriateness of the application of Iraqi conditions of contract in reconstruction projects. These conditions were compared to FIDIC Conditions. The objective wasn't comparing individual clauses, but rather exploring the principles and philosophy laying behind each conditions, and to what extent each conditions care about realizing equity between main contract parties. Validity of applic
The amicus curiae is one of the judicial procedures adopted in many judicial and legal systems around the world, under which a person who is not a party to the case, and without having a personal and direct interest in it, intervenes to draw the court’s attention to many factual and legal aspects
In this work the corrosion behavior of Al metal was studied by using non- destructive testing (NDT), which is a noninvasive technique for determining the integrity of a material. The ultrasonic waves was used to measure the corrosion which occur by two corrosive medium (0.1N sodium chloride and 0.1N sodium hydroxide) and study the corrosion by weight-loss method and electrochemical method in addition to performance the microscopic inspection for the samples before and after the immersion in the corrosive medium. Corrosion parameters were interpreted in these media which involve corrosion potential (Ecorr) and corrosion current density (icorr). The results indicate that both
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreLet R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative
Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show More
