This article is an endeavour to highlight the relationship between social media and language evolution. It reviews the current theoretical efforts on communication and language change. The descriptive design, which is theoretically based on technological determision, is used. The assumption behind this review is that the social media plays a significant role in language evolution. Moreover, different platforms of social media are characterized by being the easiest and fastest means of communication. It concludes that the current theoretical efforts have paid much attention to the relationship between social media and language evolution. Such efforts have highlighted the fact that social media platforms are awash with a lot of acronyms, cyber slangs, initialisms, morphological shortenings, etc. Much importantly, previous research has suggested that the larger the network size is, the more will be its effect on language evolution.
Embracing digital technological advancements in media and communication has led government entities to adopt communication practices fully aligned with the digital and networked system in government communication. Traditional media practices within the government environment increasingly rely on the ability to utilize digital tools and systems for content creation, communication, evaluation, and the management of the entire communication process within an electronic and intelligent framework for government services. Naturally, this transformation has caught the attention of communication and public relations researchers worldwide, as the digital and networked aspects of government communication now form an intelle
... Show MoreThis work represents implementation and investigation of optical coherent communication system between two computers. A single mode optical fiber is selected as transmission medium. The data are sent via the RS-232 standard interface with a bit rate of 9.6 kbps from personal computer (PC1) by line receive to convert the data from electrical levels (-12/+12 V) into TTL level (0/5 V). The modulation of this data was accomplished by internal modulation using laser diode type (HFCT-5208M) 1310 nm wavelength. The optical D-coupler was used to combine the optical signal that come from laser source with optical signal of laser local oscillator (OTS-304XI) at 1310/1550 nm wavelength to obtain coherent (homodyne and heterodyne) detection respective
... Show MoreIn the theoretical part, removal of direct yellow 8 (DY8) from water solution was accomplished using Bentonite Clay as an adsorbent. Under batch adsorption, the adsorption was observed as a function of contact time, adsorbent dosage, pH, and temperature. The equilibrium data were fitted with the Langmuir and Freundlich adsorption models, and the linear regression coefficient R2 was used to determine the best fitting isotherm model. thermodynamic parameters of the ongoing adsorption mechanism, such as Gibb's free energy, enthalpy, and entropy, have also been measured. The batch method was also used for the kinetic calculations, and the day's adsorption assumes first-order rate kinetics. The kinetic studies also show that the intrapar
... Show MoreObjectives: The demand for orthodontic treatment is nowadays increasing significantly for aesthetic improvement and to correct various kinds of malocclusion, yet the prolonged treatment time remains the main obstacle. This review aimed to demonstrate various orthodontic techniques and highlight the evidence-based successful approaches used for acceleration of orthodontic tooth movement. Materials and Methods: Data and sources of information pertaining to accelerated orthodontic tooth movement premised on English-written articles were searched using electronic databases including Google Scholar, Scopus, PubMed and MEDLINE. Results: This review demonstrated the availability of different surgical and non-surgical methods to enhance tooth movem
... Show MoreThis study investigates the factors that led to the outbreak of protest movements in Sudan, since Sudan’s independence in 1956 until December 2018. The study aims to identify the role of protests in bringing about political and social transformations in Sudan, besides identifying the factors that help in the success or failure of the governments that resulted from those protests, with special emphasis on the challenges of the government of the 2018 revolution. The main results of the study reveal that the December 2018 protests are the largest in term of numbers, and witness huge participation of youth and women, and the slogans raised were national and comprehensive. However, the challenges that the transitional government is going th
... Show MoreThe advertisement is important in maximizing the resources of journalistic institutions. It helps them to perform their duties and also establishes their independence. However, this type of communication has often overlapped with other types of communication, including media and publicity.
Those in charge of the press bear responsibility in this regard, as some of them harness the advertisement for personal purposes; or detrimental to media content. Many communication authorities have drawn attention to the danger of confusing the concepts and levels of the three activities and have moved towards establishing rules to reduce overlap between them.
The aim of this research is to try to disengage the concept of advertising,
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More