Videogames are currently one of the most widespread means of digital communication and entertainment; their releases are attracting considerable interest with growing number of audience and revenues each year. Videogames are examined by a variety of disciplines and fields. Nevertheless, scholarly attention concerned with the discourse of videogames from a linguistic perspective is relatively scarce, especially from a pragma-stylistic standpoint. This book addresses this vital issue by providing a pragma-stylistic analysis of the digital discourse of two well-known action videogames (First Person Shooter Games). It explores the role of the digital discourse of action videogames in maintaining real-like interactivity between the game and the gamers through the use of pragma-stylistic resources.
Background: Fiber-optic endoscopy is an important
investigation of the large intestine, whether or not the
radiologist (barium enema) has discovered a lesion in
the bowel. Colonoscopy affords a unique opportunity
to direct visualization of entire colonic mucosa. At
the same time, the physician can obtain biopsy specimens, remove polyps, and decompress volvuli.
Most experienced endoscopists and well prepared
patients can reach the cecum in over 90% of patients.
If colonoscopy is properly performed, it has a low
risk of complications, such as perforation and bleeding.
Methods: A total of 70 consecutive patients admitted
to Endoscopy department at Al-Kindy Teaching hospital from September- 2008 to July-2009.
Paronomasia is a recognized rhetorical device by which poets could play with words that are similar or identical in form but different in meaning. The present study aims to identify paronomasia in Arabic and English. To achieve the aim of the study, a corpus of selected verses chosen from two famous figures in Arabic and English literatures and analyzed thoroughly. The analysis of data under investigation reveals that paronomasia is a crucial aid used by poets to portrait the real world as imaginative. It further shows that the concept of paronomasia in English is not the same as in Arabic. In English, there are echoes of the Arabic jinās, i.e., there are counterpart usages of similar devices, yet English rhetoricians have not defined or c
... Show MoreThe researcher studies and explains the content of some pictures that are published in al-Mada newspaper. The research is important as it deals with a topic that has a relation with visual culture and its role to transfer the press letter to the audience. The researcher finds that cartoonist exposed the security services through important people who have a major role in state policy and reveals the level of corruption and the weak treatments for this phenomenon and its reflection on the whole society and individuals. In addition to that, cartoonists try to encourage the public for going on the peaceful demonstrations since it is a good tool to make pressure on the government to punish the corrupts.
The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreMental systems in ontological discourse turned into deliberative systems, derived from the non-coordinated thought that motivated ontological discourse, as an incomplete thought, after it became close to reason; Between creation and prevention, between reasoning and creation, between submission and ambition, the result of an interconnected entity that slays one another from one another, and intersects with one another, to produce a special pattern each time, completely different from its predecessor or to provide a path for the coordination of others, which is outside the linguistic event, or part From it, signs and marks, produced to a large extent M., and united the signs; to return again in a circular and rotational movement to produc
... Show Moreבמחקר הזה ניתחנו מספר נאומים של שמעון פרס, אנחנו התמקדנו בהשפעה והשכנוע אצל שמעון פרס ואיך הוא יכול להעביר את המסרים של נאומיו בסגנון פרגמטי כדי להגיע ללבו של הציבור.
גם כן, התמקדנו בסגנון הפוליטי שהוא חושב כי התחום הזה צריך להיות ברור מול הציבור וגם כן מול דעת הקהל הבינלאומי מתוך השימוש במונחים בעלי השפעה ושכנוע להגיע למטרות המבוקשות.
במלים אחרות, שמעון פרס, לעתים, מתמקד בשפה מליצית ויעמוד הרב
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreIt is a well-known fact that publishing companies spend much money, time and energy in designing their book covers to attract potential customers. As the first thing people do when they buy or intend to buy a book is looking at its front cover. However, if there is a need to know more about the book, people usually look at the information on its back cover. This paper attempts to explore the persuasive function of blurbs beyond the constraints of the academic domain and consequently their connection with advertising discourse in two main sections: The first presents the concept of blurb and its structure while the second defines persuasion and shows the most prominent strategiesused in blurbs. Finally, this paper gives the conclusion tha
... Show MoreThe cinematic story depends on many construction techniques that together constitute the story features technically and the secondary events are considered one of these basic techniques that are directly affected by the employment mechanisms inside the cinematic achievement. This subject initiated the two researchers to decide the title of the research: (Mechanisms of Employing Secondary Event in Cinematographic Discourse). The research is divided into an introduction that included the problem details, the aim and defining the terms used. The first section was the act and the event in the cinematic story, which addressed the relation between the act and the event and the nature of the simulation that tries to ascend the human act
... Show More