Joseph Curtis wrote in his book (Introduction to Semiotics narrative and rhetoric) on the development of a semiotic project in exploring the meaning of communion. The book is rich in theoretical and analytical benefits both in the approach of texts and in the pursuit of letters in search of mechanisms of scriptural and scriptural generation and mechanics in narrative production, especially as the book offers exercises that help to assess the distance separating the narrative spread from the sin of the text, for the semiotics, Refers to the theoretical developments of the science of relations, through the combination of conventional definitions and the representative and comparative limitations, to provide an approach to the application of the semiarithian story of the semantics of the general organization of the sequences .. We will try in this study to monitor the following:
The philosophical perspective of semiotic terms.
Procedural deliberation of conceptual perspectives.
The taxonomy of Ficus L., 1753 species is confusing because of the intense morphological variability and the ambiguity of the taxa. This study handled 36 macro-morphological characteristics to clarify the taxonomic identity of the taxa. The study revealed that Ficus is represented in the Egyptian gardens with forty-one taxa; 33 species, 4 subspecies and 4 varieties, and classified into five subgenera: Ficus Corner, 1960; Terega Raf., 1838; Sycomorus Raf., 1838; Synoecia (Miq.) Miq., 1867, and Spherosuke Raf.,1838; out of them seven were misidentified. Amongst, four new Ficus taxa were recently introduced to Egypt namely: F. lingua subsp. lingua Warb. ex De Wild. & T. Durand, 1901; F. pumila L., 1753; F. rumphii Blume, 1825, and F. su
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show MoreFeedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi
... Show MoreIn this research, beam expander, BEX, is explained and designed for illuminating the
remote flying target. The BEX is optically designed to be suited for Nd:YAG laser of given
specifications. The BEX is modified to be zoom one to meet the conditions of preventing the
receiving unit; i.e the photodetector, from getting saturated at near and far laser tracking.
Decollimation could be achieved by automatic motor, which controls zoom lens of the BEX
according to the required expansion ratio of beam expander
Background: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More