This article discusses the function of semiotics in political discourse after the socio-political processes taking place in Iraq since 2003 and its role in the development of textual criticisms of some Iraqi politicians, analyzes the reasons for its functioning in the speech of politicians. The research is mainly focused on finding out to what extent political text studies draw on sign systems that can store and transmit information, the nature of its purpose and the use of available fields for the purpose to be achieved. The chief purpose of the study is to investigate and also clarify the symbols and signs appear within the framework of discursive Iraqi politicians, the nature of the symbols used, and the meanings that are include
... Show MoreThis study included the determination of mercury level in twelve samples of skin whitening cream available in local market in Baghdad by atomic absorption spectrophotometer ,all the samples analyzed was contained a detectable amount of mercury. The lowest concentration of mercury in the sample C (Top Shirley) was 0.482 μg/g, and the higher concentration was 29.54 μg/g in the sample J (Norseen) .It was also noted that the samples H (whitening speckle removing day cream) and K (whitening speckle removing night cream) did not mention in the label significance the name of the country of origin and date of the validity of the product.
The azo dye brilliant reactive red K-2BP (λmax = 534 nm) is widely used for coloring textiles because of its low-cost and tolerance fastness properties. Wastewaters treatment that contains the dye by conventional ways is usually inadequate due to its resistance to biological and chemical degradation. During this study, the continuous reactor of an advanced oxidation method supported the use of H2O2/sunlight, H2O2/UV, H2O2/TiO2/sunlight, and H2O2/TiO2/UV for decolorization of brilliant reactive red dye from the effluent. The existence of an optimum pH, H2O2 concentration, TiO2 concentration, and d
... Show MoreThis paper describes the synthesis of ?- Fe2O3 nanoparticles by sol-gel route using carboxylic acid(2-hydroxy benzoic acid) as gelatin media and its photo activity for degradation of cibacron red dye . Hematite samples are synthesized at different temperatures: 400, 500, 600, 700, 800 and 900 ?C at 700 ?C the ?-Fe2O3 nanoparticles are formed with particle size 71.93 nm. The nanoparticles are characterized by XRD , SEM, AFM and FTIR . The 0.046 g /l of the catalyst sample shows high photo activity at 3x10-5M dye concentration in acidic medium at pH 3.
في البداية اود الاشارة الى ان فهم حقيقة الازمة هو ذو جانب فني يتعلق بالجينات الوراثية لنظام يملك في احيناته قدرة عالية على تفريخ المشتقات. هذا النظام الذي يزداد عقما وتدميرا يزداد قدرة على خلق النقود الائتمانية/المشتقات، وكلما اقتربنا اكثر من فهم هذا الجانب كلما اسقطت في ايدينا تلك التوصيفات الاكاديمية الجاهزة في نقص الرقابة والاشراف، تركيز المخاطر،....الخ التي تناولتها الكتابات الشائعة في معظم طروحات
... Show MoreAbstract
This research deals with studying and analysis of a poetic group under the
title (Trees behind fence) of the great poet Dr. Ahmed Sulaiman AlAhmed
who is the some of the Shek , Sulaiman Al-Ahmed who is the linguist - poet
and famous jurist member in the Arabic scientific assemble in Damascus and
brother of the great poet Badawi Al-Jabal. This poetic group include two big
poetic legends : the first one is (Trees behind fence , ) which include one
hundred and eighty four line and the second one ( AZ-Mebadia ) which is
consists of one hundred and seventy eight line, both of them from the (Al-
Camil ) meter which is free rhyme which bears a many meaning and pictures
and just the great poet composite the
In this study, a platinum(II) complex ([Pt(H2L)(PPh3)] complex) containing a thiocarbohydrazone as the ligand was tested as an anti-proliferative agent against ovarian adenocarcinoma (Caov-3) and human colorectal adenocarcinoma (HT-29) through MTT assays. Apoptotic markers were tested by the AO/PI double staining assay and DNA fragmentation test. Flow cytometry was conducted to measure cell cycle distribution, while the p53 and caspase-8 pathways were tested via immunofluorescence assay. Results demonstrated that the cytotoxic effect of the Pt(II)- thiocarbohydrazone complexes against Caov-3 and HT-29 cells was highly significant, and this effect triggered the activation of the p53 and caspase-8 pathways. Besides, apoptosis stimulated by th
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show More