This study aims to observe and analysis the propaganda discourse image for Daesh, and know how it marketing the fear due to symbols structure, and discover the straight meanings and hidden inspiration, with the ideology that the image presented.
The study is descriptive and qualitative, and the method is analytic survey used semiotic approach.
The most important results of the study refer to:
- Daesh functioning the image in fear manufacture in all it components: the symbol of savageness, body language, color, clothes uniform and professionally shot.
- The indicative meaning of fear promoted by Daesh based of the manufacturing «Holy», and that mean places non-touchable and non-insulted.
- Daesh used in its propaganda image discourse all methods of violence for fear manufacture: direct, verbal and symbol violence.
The electronic characteristics, including the density of state and bond length, in addition to the spectroscopic properties such as IR spectrum and Raman scattering, as a function of the frequency of Sn10O16, C24O6, and hybrid junction (Sn10O16/C24O6) were studied. The methodology uses DFT for all electron levels with the hybrid function B3-LYP (Becke level, 3-parameters, Lee–Yang-Parr), with 6-311G (p,d) basis set, and Stuttgart/Dresden (SDD) basis set, using Gaussian 09 theoretical calculations. The geometrical structures were calculated by Gaussian view 05 as a supplementary program. The band gap was calculated and compared to the measured valu
... Show MoreThis research analyses the tweets of Iraqi politicians (leaders) that took place simultaneously with the formation of the Iraqi government after the elections in 2018. The formation of the Iraqi government was considered one of the most critical issues that emerged in the political process to which the Iraqi media as well as social networking sites paid considerable attention. In this regard, Iraqi political leaders have published many tweets concerning the formation of the government, some of them have caused great controversy in the political climate. As Twitter is one of the most digital platforms that have been widely used on the global scale in recent years, politicians have employed it to publish their opinions, ideas, and to excha
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
This study has been developed axes of the search, including: Search (deliberative) language and idiomatically, and Description Language (b social phenomenon), and the definition of the theory of (acts of speech), and discussed the problem of the conflict between tradition and innovation, as defined objectively have a target aimed at reviving the deliberative thought when Arab scholars , and the balance between the actual done Arab and Western rhetoric, but Meet in intellectual necessity, a sober reading that preserve the Arab language prestige, and its position in the light of the growing tongue Sciences, as long as we have inherited minds unique, and heritage huge able to consolidate the Arab theory lingual in linguistics.
Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreSimple and sensitive batch and Flow-injection spectrophotometric methods for the determination of Procaine HCl in pure form and in injections were proposed. These methods were based on a diazotization reaction of procaine HCl with sodium nitrite and hydrochloric acid to form diazonium salt, which is coupled with chromatropic acid in alkaline medium to form an intense pink water-soluble dye that is stable and has a maximum absorption at 508 nm. A graphs of absorbance versus concentration show that Beer’s law is obeyed over the concentration range of 1-40 and 5-400 µg.ml-1 of Procaine HCl, with detection limits of 0.874 and 3.75 µg.ml-1 of Procaine HCl for batch and FIA methods respectively. The FIA average sample throughput was 70 h-1. A
... Show MoreIn this study, the possible protective effects of daidzein on ifosfamide-induced neurotoxicity in male rats were examined by the determination of changes in selected oxidant–antioxidant markers of male rats’ brain tissue.
Twenty-eight (28) apparently-healthy Wistar male rats weighing (120-150gm) allocated into 4 groups (n=7) were used in this study. Rats orally-administered 1% tween 20 dissolved in distilled water/Control (Group I); rats were orally-administered daidzein suspension (100mg/kg) for 7 days (Group II); rats intraperitoneally-injected with a single dose of ifosfamide (500 mg/kg) (Group III); rats orally-administered for 7 days with the daidzein (100mg/
... Show More