APDBN Rashid, Southern African Linguistics and Applied Language Studies, 2023
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreHate speech (henceforth HS) has recently spread and become an important issue. This type of speech in children's writings has a particular formulation and specific objectives that the authors intend to convey. Thus, the study aims at examining qualitatively and quantitatively the classism HS and its pragmatic functions via identifying the speech acts used to express classism HS, the implicature instigated as well as impoliteness. Since pragmatics is the study of language in context, which is greatly related to the situations and speaker’s intention, this study depends on pragmatic theoriespeech acts, impoliteness and conversational implicature) to analyze the data which are taken from Katherine Mansfield's short story (The D
... Show MoreBackground: Malignant lymphoma is the generic term given to tumors of the lymphoid system and specifically of lymphocytes and their precursor cells, While all lymphomas are malignant neoplasms, there is a wide spectrum of clinical behavior, with some following an indolent clinical course and others behaving in an aggressive manner (will causing death in a short time frame if left untreated). The metastatic process involves intravasation and extravasation of tumor cells, followed by reimplantation of tumor cells, formation of a new tumor stoma, Degradation of the extracellular matrix and components of the basement membrane by proteases facilitates the detachment of tumor cells, their crossing of tissue boundaries, and invasion into adjacent
... Show MoreMental systems in ontological discourse turned into deliberative systems, derived from the non-coordinated thought that motivated ontological discourse, as an incomplete thought, after it became close to reason; Between creation and prevention, between reasoning and creation, between submission and ambition, the result of an interconnected entity that slays one another from one another, and intersects with one another, to produce a special pattern each time, completely different from its predecessor or to provide a path for the coordination of others, which is outside the linguistic event, or part From it, signs and marks, produced to a large extent M., and united the signs; to return again in a circular and rotational movement to produc
... Show More