The research aims to determine what a photograph intends to convey as a visual text. Photographs are not captured randomly, especially those of politicians. Each photograph carries a message, even if interpretations of that message vary from person to person. The research adopts a methodology based on semiotic analysis, applying Laurent Gervero's model to analyze a photograph of the Iraqi Prime Minister Mustafa Al-Kadhimi's visit to Fallujah on the anniversary of the victory over ISIS. The photographs in question constitute a visual language built upon a sequence of iconic symbols and signs. These elements coalesce to give rise to an image centered around a particular theme, one designed to convey a precise message to the intended audience. Additionally, they serve as a window into the photographer's ideology, as they make deliberate choices regarding which aspects of the event to capture through their camera lens.
The research yields several results, including: The ideas and meanings contained in the photograph, both in form and content, fall within the framework of political marketing for the personality of the Iraqi Prime Minister Mustafa Al-Kadhimi, highlighting him as a strong and sharp personality. The rhetoric of the photograph emphasizes unity, rejection of sectarianism and nationalism. The diversity and functional progression of Al-Kadhimi's career in journalism and historical documentation helped him gain experience in the art of appearance and influence on the recipient, in addition to his previous work in the sensitive field of intelligence.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBackground: Routine supplementation of vitamin D to infants is justifiable since vitamin D deficiency, and its consequences are highly prevalent not only in developing countries but worldwide. Maintaining a normal level of vitamin D is crucial in order to have a normal skeletal, as well as, extra-skeletal health. Knowledge of mothers regarding importance of vitamin D supplementation affect the health of their babies in a positive manner if accompanied by appropriate practice.
Objective: To determine the level of knowledge, attitude and practice of Iraqi mothers of under or equal 12 months old infants in Baghdad, AL-Rusafa, regarding vitamin D supplementation for their infants.
Typ
... Show MoreTeresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce
... Show MoreIn this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show MoreConflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe research aimed to shed light on the impact of international Accounting Standard No (21) on tax obstacles represented by (tax evasion, double taxation) The financial statements of a group of banks operating in the private sector were relied upon to know the impact of the standard on tax obstacles, as well as knowing the amount of amounts, The researcher relied on the method of financial analysis of that data, which was obtained from the website of the Securities Commission, and conducted personal interviews with a number of university professors, chartered accountants, financial experts, banks, and the General Authority for Taxes to benefit from their
... Show MoreThe levels of circulating angiogenic and anti-angiogenic factors, namely vascular endothelial growth factor–A (VEGF-A) and soluble vascular endothelial growth factor receptor-1 (sVEGFR-1), have been linked to the development of renal dysfunction due to the proliferation of microvasculature within the kidneys of type 2 diabetic (T2DM) patients. The study aims to scrutinize serum levels of VEGF and sVEGFR-1 in a sample of Iraqi diabetic nephropathy patients to support their reliability as markers for the prediction of nephropathy in type 2 diabetes mellitus patients as well as to assess the ACE inhibitor’s effect on the levels of these two markers. Method: The ninety participants of this case-control study were split into three gr
... Show More