This research attempted to take advantage of modern techniques in the study of the superstructural phonetic features of spoken text in language using phonetic programs to achieve more accurate and objective results, far from being limited to self-perception and personal judgment, which varies from person to person.
It should be noted that these phonological features (Nabr, waqf, toning) are performance controls that determine the fate of the meaning of the word or sentence, but in the modern era has received little attention and attention, and that little attention to some of them came to study issues related to the composition or style Therefore, we recommend that more attention should be given to the study of these features because of their importance in uncovering aspects that have not yet been investigated.
The features of strategic thought transformation in Russia based on attempt confirm the Russian influenced on Region of Eastern Europe through series of common defense treaties and mutual security between USSR and another states this treaties emphasis size on direct Russian supervision on these states in addition, Russia in trusted to formation communism regimes in its vital space, Russia inherited the status of former USSR in political and economic levels.
Shortly we can see that Russia witnessed large Transformation in political strategic thought as a result of change in internal strategic environment and change of nature understanding which influenced on Russia. This
... Show MoreLanguage is a means of communication among the human beings. Every language that distinguish them from others. However, there is language common that is common of all human beings without discrimination and expression of ideas. Perhaps it is more honest that the usual language.
The research is divided into a preface which speaks about the meaning of body language. Then we speak about body gestures like the eyes, hand, the tongue the heart reaching up the conclusion in which we found that the body language is one of the terms included in the Holy Quran, which has original roots. But this term is recently common and spread in the present time. Most of those who tack
... Show MoreThe study aimed to examine the phonological processing profile for students with and without reading disabilities in cycle 1 schools of basic education in the Governorate of Muscat, Sultanate of Oman. The study participants included 306 students, 165 students with reading disabilities and 141 students without reading disabilities. The Comprehensive Test of Phonological Processing (CTOPP) and Working Memory Test (WMT) were administered to the participants. The results of the study showed that the mean score of students without reading disabilities was higher than that of students of reading disabilities in all measures of phonological processing, and that there are statistically significant differences on the case of students in all
... Show MoreSchool administration has an effective role in stimulating academic achievement, as it is the ideal regulation and activation of material and human power to achieve the goals of the educational process. This role has axes in the form of interests, aids, and specific procedures exercised by the school administration in improving the educational process, and assisting researchers in achieving the highest levels of academic achievement. This activation is achieved through stages of planning, organizing, coordinating, and evaluating.
To achieve the aims of this research, the researcher pursued the descriptive analytical approach, which is considered one of the most appropriate approaches to the nature of this type of research. The qu
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
The form imposes its importance in the structure of the artwork through its indication of the type of relationship between the artist and his external world in all its aspects, as well as its manifestation of artistic and aesthetic values, and the multiplicity of experimental means of expression that include the artist's feelings and imagination. The form is also a recording of the events in their temporal and spatial circumstances, and in that it is of value in directing his artistic discourse with the aim of influencing the recipient with its connotations and emotional states. Horses in the drawings of Amer Al-Obaidi, and the research came within two frameworks: The first framework is the methodological framework that represents us t
... Show MoreTo translate sustainable concepts into sustainable structure, there is a require a collaborative work and technology to be innovated, such as BIM, to connect and organize different levels of industry e.g. decision-makers, contractors, economists, architects, urban planners, construction supplies and a series of urban planning and strategic infrastructure for operate, manage and maintain the facilities. This paper will investigate the BIM benefits as a project management tool, its effectiveness in sustainable decision making, also the benefit for the local industry key stakeholders by encouraging the BIM use as a project management tool to produce a sustainable building project. This p
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreThe reciprocal relationship between the text and the mask in the printed product is one of the most important relationships that frame the level of communication between the appearance and the interior, although it is not cared for by some designers and publishing institutions. Therefore, the problem of research is determined by the following question (What is the dialectical relationship between the text and the mask in the literary books covers design?). The research aims to shed light on this problematic relationship at the level of reception and aesthetics at the same moment. The theoretical framework included two sections: the first (mask and text ... the concept and the mutual relationship), while the second section (trends in the
... Show More