This paper deals with a central issue in the field of human communication and reveals the roaming monitoring of the incitement and hatred speech and violence in media, its language and its methods. In this paper, the researcher seeks to provide a scientific framework for the nature of the discourse of incitement, hatred speech, violence, and the role that media can play in solving conflicts with their different dimensions and in building community peace and preventing the emergence of conflicts among different parties and in different environments. In this paper, the following themes are discussed:
The root of the discourse of hatred and incitement
The nature and dimensions of the discourse of incitement and hatred speech
The negative roles of the contents of letters of incitement and hatred speech, hate and violence
Language and incitement, hatred and violence
Language features in hatred speech
Hate and incitement speech in the internet
عملية تغيير حجم الصورة في مجال معالجة الصور باستخدام التحويلات الهندسية بدون تغيير دقة الصورة تعرف ب image scaling او image resizing. عملية تغيير حجم الصورة لها تطبيقات واسعة في مجال الحاسوب والهاتف النقال والاجهزة الالكترونية الاخرى. يقترح هذا البحث طريقة لتغيير حجم الصورة باستخدام المعادلات الخاصة بمنحني Bezier وكيفية الحصول على افضل نتائج. تم استخدام Bezier curve في اعمال سابقة في مجالات مختلفة ولكن في هذا البحث تم استخد
... Show MoreLandsat7 of Enhanced thematic mapper plus (ETM+) was launched on April 15, 1999. Four years later, images start degrading due to the scan line corrector (SLC). SLC is a malfunction that results in pixel gaps in images captured by the sensor of Landsat7. The pixel gap regions extend from about one pixel near the image center and reach up to about 14 pixels in width near the image edge. The shape of this loss is like a zigzag line; however, there are different studies about repairing these gaps. The challenge of all studies depends on retrieving inhomogeneous areas because the homogenous area can be retrieved quickly depending on the surrounding area. This research focuses on filling these gaps by utilizing pixels around them
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreThere is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions as a whole.
The topic of attention was drawn to the attention of the speakers, as it made me ponder it carefully, and my goal in that is to know the reason for the interest of the speakers and their care for it, and to clarify from their books the purpose of making this topic one of the advanced investigations with them.
The idea of writing a paper on the subject of consideration was not absent from my thinking, because I saw the attention of speakers on this issue, as they made it one of the first issues that they deal with studying in their work
... Show MoreFinding Masculinity in the "Great War": An Analytical Study of A Long Long Way by Sebastian Barry Abstract This paper intends to show the relation between war and masculinity, through drawing a sketch of the masculine identity of the soldiers during the First World War (also known as the Great War). It studies the association between “ideal manhood” and wartime duties. The paper travels though the experience of Willie Dunne, a young Irish soldier in A Long Long Way (2005) by the Irish writer, Sebastian Barry. Through the paper, the researcher traces the social and familial pressures that lead Willie to enlist in the army, and to experience the atrocities of the First World War in order to search for his masculinity. Raywne Connell's co
... Show MoreEvaporation from water bodies is important and considered a major problem in dry and semi-dry regions, in this research the evaporation has been analyzed from two approaches: engineeringly and statistically. The engineering approach deals with the calculation of evaporation rates of Mosul Dam Lake. Three methods were used: pan evaporation class A, the combined and the mass-transfer. It was found that the values obtained by pan evaporation class A method was the highest among the other, while the mass transfer method achieved the lowest results. The evaporation rates during the year ranged according to the first method (0.9–5.5) mm/day, second (0.7–11.5) mm/day and the last method (1.0039×106) m3/year, whi
... Show MoreAbstract : Silicone elastomer is widely used as the material of choice for fabricating maxillofacial prosthesis. However, silicone properties are far from ideal; low tear strength, low tensile strength and insufficient elasticity are the most undesirable properties. The purpose of this study was to evaluate the effect of addition of nano SiO2filler on tear strength, tensile strength, elongation at break, hardness and color of Cosmesil M-511 HTV maxillofacial silicone elastomer. Nano SiO2was added to the silicone base in concentrations of 4%, 5% and 6% by weight. Silicone with 0% nano filler served as a control. Tear test was done according to ISO 34-1. Tensile and elongation test was done according to ISO 37. Shore A hardness test was done
... Show More