Communication has seen a big advancement through ages; concepts, procedures and technologies, it has also seen a similar advancement of language. What unites language and media is the fact that each one of them guides and contributes to the other; media exists and results from language and from the other sign systems, and what strengthens this connection is the symbolic language system, as media helps it by providing knowledge and information. The change that occurred through time must leave a significant trace in the media, for example Diction, which has changed concerning development and growth, also the ways and mediums of media have become manifold and widespread. This change affected the recipient whether it was a reader, listener or watcher; as diction became no longer read in written paragraphs where punctuation rules are respected, it neither became a representation of the meaning in an attempt to be described, but it is rather another picture represented with words and performance, along with a deep knowledge of the language’s characteristics, especially oral characteristics, As do appear the personal and phonetic features of maintaining signaling systems: word system, sentence system, text system, speech system. The modern science of language has encouraged the responsables of communication to make use of the tremendous achievements of our times since the beginning of the 20th century, especially in the development of semiotics, which became sign of this century’s development. Whilst, Linguistics is trying to summarize the special minor signifying units from the sentence. Semiotics occupies a decent position, as it aims to extrapolate the semantic system according to a unit larger than the sentence, that is the speech from which there is no benefit simply by just adding the minor signifying units that construct it. However, it is extracted
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreThis study aimed to assess the possible association of oxytocin (OXT) gene with reproductive traits in two groups of Awassi ewes that differ in their reproductive potentials. Sheep were genotyped using PCR—single-stranded conformation polymorphism approach. Three genotypes were detected in exon 2, CC, CA, and AA, and a novel SNP was identified with a missense effect on oxytocin (c.188C > A → p.Arg55Leu). A significant (p < 0.01) association of p.Arg55Leu with the twinning rate was found as ewes with AA and CA genotypes exhibited, respectively a lower twinning ratio than those with the wild-type CC genotype. The deleterious impact of p.Arg55Leu was demonstrated by all in silico tools that were utilized to assess the effect of this varian
... Show MoreDrawing upon the recent theoretical framework of Burkean concept of identification (ID), the current study aims at probing the interaction of content and form in two letters penned by Iran’s Supreme Leader and addressed to the Youth on Jan. and Nov. 2015. To this end, the study seeks (i) to determine a role ID takes in the conveyance of intended assumptions to the targeted readers; and (ii) to observe if the writer’s objectives, i.e. to identify himself with the readers and to realize his politically-religiously-infused creeds, result in success or failure; moreover, (iii) it seeks to determine how he achieved his end to attenuate the impacts of blazing inferno of Islamophobia and anti-Islam sentiments in his addressees. The who
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More