The propaganda war is one of the most dangerous weapons used in various conditions of war and peace within any intellectual, political or military conflict to be targeted by multiple social groups and their effects on the intellectuals to change the viewpoints at the local and global level, including the use of technical treatment of the audio and visual medium, The impact of the psychological dimensions of the arms in the confrontation and spread terror in the ranks of the enemies and in the forefront of what Iraq faces in its battle against the And the use of it as a propaganda content contributes to the development of the spirit of tranquility and tranquility in the hearts of Iraqis and the return of the right to the owners “that artistic expression cannot be achieved not through something to turn into that exciting or sensory stimuli .... Only after the hand of the artist has spread to them created from them Aesthetically felt “(), hence the problem of research in the following question: What is the role of the elements of cinematic expression as an intermediary within the structure of the work of art to counter the promotion of radical ideas for the terrorist?
Peaceful coexistence is not seen as a new topic of secretions of modern civilization, a requirement to solve the problems of our era or one of the indications of urgent immediate needs, rather, tolerance is considered basis for building a state. Therefore, we can touch on the principles and basics of tolerance in the Holy Qur’an, the speeches of the Messenger (may God bless him and grant him peace) and his hadiths, and the principle of brotherhood that he established
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
Background: Obesity tends to appear in modern societies and constitutes a significant public health problem with an increased risk of cardiovascular diseases.
Objective: This study aims to determine the agreement between actual and perceived body image in the general population.
Methods: A descriptive cross-sectional study design was conducted with a sample size of 300. The data were collected from eight major populated areas of Northern district of Karachi Sindh with a period of six months (10th January 2020 to 21st June 2020). The Figure rating questionnaire scale (FRS) was applied to collect the demographic data and perception about body weight. Body mass index (BMI) used for ass
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreLK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2
Liquid electrodes of domperidone maleate (DOMP) imprinted polymer were synthesis based on precipitation polymerization mechanism. The molecularly imprinted (MIP) and non-imprinted (NIP) polymers were synthesized using DOMP as a template. By methyl methacrylate (MMA) as monomer, N,Nmethylenebisacrylamide (NMAA) and ethylene glycol dimethacrylate (EGDMA) as cross-linkers and benzoyl peroxide (BP) as an initiator. The molecularly imprinted membranes were synthesis using acetophenone (APH), di-butyl sabacate (DBS), Di octylphthalate (DOPH) and triolyl phosphate (TP)as plasticizers in PVC matrix. The slopes and limit of detection of l
... Show Moreتضمن البحث التعريف بالإمام البزازي، وحياته العلمية، ومشايخه، وتلامذته، ومؤلفاته، ووفاته، وأربعة مسائل مختارة من ترجيحاته في الحدود والجنايات، والإمام محمد بن محمد بن شهاب بن يوسف (ت827هـ)، يُكنَّى بالكَردَرِيِّ الحنفي الخوارزمي الشهير بالبزَّازي، ويُنسب إلى كَرْدَر، وقد عرض في كتابه كثيرًا من كتب الحنفية، وذكر الكثير من آراء علمائهم مع تعرضه لبعض آراء المذاهب الأخرى. ولم يعتمد على التعريفات اللغوية والاصط
... Show More