It must be emphasized that media is amongst human studies fusing older and more recent sciences together, and that its disclosures are the physics of the new communication. Michio Kaku, a theoretical physicist, in his book “ Visions”, confirms this fact when he says :” As a research physicist, I believe that physicists have been particularly successful at predicting the broad outlines of the future .Professionally, I work in one of the most fundamental areas of physics, the quest to complete Einstein's dream of a "theory of everything." As a result, I am constantly reminded of the ways in which quantum physics touches many of the key discoveries that shaped the twentieth century. “ He then got to the fact that the physical disclosures are at the service of the media process. He says:” In the past, the track record of physicists has been formidable: we have been intimately involved with introducing a host of pivotal inventions (TV, radio, radar, X-rays, the transistor, the computer, the laser, the atomic bomb), decoding the DNA molecule, opening new dimensions in probing the body with PET, MRI, and CAT scans, and even designing the Internet and the World Wide Web. “ The problem of the research is that we set its limits at the beginning of the third millennium, ie. after the emergence of the phenomenon of the Italian Berlusconi, and the importance of research lies in the diagnosis of a new phenomenon that is contrary to the ethics of media work. But the problem of the research will remain present, represented by this continuous transformation and pursuit of bringing together the three authorities, also the disengagement will be a priority for the research. The major breakthroughs made to the media will make the monitoring task a difficult one. It is clear from the foregoing, that the ethics of media work face serious risks as dangerous as technological development that has left a chance for the media to reach high levels. A new threat has been diagnosed by "liberal globalization", which seeks to form multinational media groups with the power of politics, media and finance.On the other hand, there are those who are working to stop this new media invasion. We have referred to the attempts of media expert Agnassio Ramonet, who demanded the establishment of a fifth authority and the establishment of a media watchdog, but the level of work did not record any material return, while for the liberal globalization front, it performs like a fast train that can reach any destination. If we have an opinion regarding this matter, what we require is the broadcasting of a "media culture" in which the masses constitute a media immunity for the citizen, which means that the average recipient can understand and analyse the media game through the same source,the same dimension and the same goal. It is the civic sense of the media that will help uncover the mysteries of the great media game. It also reduces the clash between the three authorities - the state authority, the media authority and the authority of money,but still, it won’t be able to dismantle it and cancel it at the current stage.
In this paper two modifications on Kuznetsov model namely on growth rate law and fractional cell kill term are given. Laplace Adomian decomposition method is used to get the solution (volume of the tumor) as a function of time .Stability analysis is applied. For lung cancer the tumor will continue in growing in spite of the treatment.
The current research was aimed at the following:
1. Measurement of Personality Type Observer of the University students.
2. Identify the differences in Personality Type Observer among the University students according to variable of Sex (male / female). And according to variable of Specialization (scientific / literary)
3. Measurement of Withdrawal of the University students.
4. Identify the differences in Withdrawal among the University students according to variable of Sex (male / female). And according to variable of Specialization (scientific / literary).
5. Identify the relationship between Personality Type Observer and Withdrawal.
To achieve this aims of the research, the researchers set up the instrument is scale
Document clustering is the process of organizing a particular electronic corpus of documents into subgroups of similar text features. Formerly, a number of conventional algorithms had been applied to perform document clustering. There are current endeavors to enhance clustering performance by employing evolutionary algorithms. Thus, such endeavors became an emerging topic gaining more attention in recent years. The aim of this paper is to present an up-to-date and self-contained review fully devoted to document clustering via evolutionary algorithms. It firstly provides a comprehensive inspection to the document clustering model revealing its various components with its related concepts. Then it shows and analyzes the principle research wor
... Show MoreThe purpose of this paper is to introduce and prove some coupled coincidence fixed point theorems for self mappings satisfying -contractive condition with rational expressions on complete partially ordered metric spaces involving altering distance functions with mixed monotone property of the mapping. Our results improve and unify a multitude of coupled fixed point theorems and generalize some recent results in partially ordered metric space. An example is given to show the validity of our main result.
Background: Polycystic ovary syndrome (PCOS) is
the most common form of chronic anovulation
associated with androgen excess; it occurs in about 5
– 10% 0f reproductive age women. Metabolic
syndrome is characterized by insulin resistance,
hypertension, obesity, abnormalities of blood clotting
and dyslipidemia.
Adult women with PCOS have an increased
prevalence of the metabolic syndrome(MBS).
Objectives: To detect the prevalence of metabolic
syndrome in women with proved PCOS, attending the
Specialized Center for Endocrinology and Diabetes, in
Baghdad.
Materials and methods : A total number of 40
women with proved PCOS were included in this study
which was conducted in the Specialized Center f
The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged
... Show MoreA new panel method had been developed to account for unsteady nonlinear subsonic flow. Two boundary conditions were used to solve the potential flow about complex configurations of airplanes. Dirichlet boundary condition and Neumann formulation are frequently applied to the configurations that have thick and thin surfaces respectively. Mixed boundary conditions were used in the present work to simulate the connection between thick fuselage and thin wing surfaces. The matrix of linear equations was solved every time step in a marching technique with Kelvin's theorem for the unsteady wake modeling. To make the method closer to the experimental data, a Nonlinear stripe theory which is based on a two-dimensional viscous-inviscid interac
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
