The article considers a creolized text as a means of modern communication, describing its key verbal and visual components; the relationship of concepts polycode and creolized text has been shown; the universal basic image features have been called; the following kinds of creolized texts have been distinguished; it has been proved that the effective means of attracting the attention of the addressee is the use of expressive font features, which are divided into two groups: topographics (mechanisms of varying of areal syntagmatic of a text) and supragraphcs (change of typeface of font).
This study aims to know the degree of importance and the availability of the enhancing specifications of the educational process, and the way its objectives are achieved. Such a step involves using educational techniques, laying the selection foundations, knowing the methods of their employment and tracking the obstacles that limit this employment in teaching Arabic to non-native speakers. To achieve these objectives, the study followed a descriptive approach, and collected the necessary data through an integrated questionnaire prepared for the purpose of describing the phenomenon or topic. This approach was adopted, as it is characterized by being comprehensive, focuses on collecting data related and necessary to the topic under study.
... Show MoreHenrik Ibsen is considered one of the greatest writers on society and its problems in the modern era, as his works deal with society in all its forms in a realistic way, in which he presents the motives and consequences of social problems and their impact on society to study these problems through them to and propose solutions through theatre. Most of his writings were very serious about addressing these social issues. The method of collecting information in the study came through reviewing a group of sources related to realistic theater and social theory, then reading the plays covered in a critical and analytical reading. Based on that, the method of writing this study came and used a group of sources that directly relate to the s
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreThe present study deals with the optimum design of self supporting steel communication towers. A special technique is used to represent the tower as an equivalent hollow tapered beam with variable cross section. Then this method is employed to find the best layout of the tower among prespecified configurations. The formulation of the problem is applied to four types of tower layout
with K and X brace, with equal and unequal panels. The objective function is the total weight of the tower. The variables are the base and the top dimensions, the number of panels for the tower and member's cross section areas. The formulations of design constraints are based on the requirements of EIA and ANSI codes for allowable stresses in the members
Eye loss may be caused as a result of eye trauma, accidents, or malignant tumors, which leads the patient to undergo surgery to remove the damaged parts. This research examines the potential of computer vision represented by Structure from Motion (SfM) photogrammetry in fabricating the orbital prosthesis as a noninvasive and low-cost technique. A low-cost camera was used to collect the data towards extracting the dense 3D data of the patient facial features following Structure from Motion-Multi View Stereo (SfM-MVS) algorithms. To restore the defective orbital, a Reverse Engineering (RE) based approach has been applied using the similarity RE algorithms based on the opposite healthy eye to rehabilitate the defected orbital precisely
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreВ статье рассматриваются понятие наглядности и ее классификация, эффективное применение принципа наглядности, возможность и преимущество использования наглядности и современные инструменты ее реализации в ираке.
Вследствие глобальных изменений во всем мире изменилась и роль иностранного языка в системе образования. Современный человек, шагающий в ногу со временем, не мыслит себя без зна
... Show MoreFacial emotion recognition finds many real applications in the daily life like human robot interaction, eLearning, healthcare, customer services etc. The task of facial emotion recognition is not easy due to the difficulty in determining the effective feature set that can recognize the emotion conveyed within the facial expression accurately. Graph mining techniques are exploited in this paper to solve facial emotion recognition problem. After determining positions of facial landmarks in face region, twelve different graphs are constructed using four facial components to serve as a source for sub-graphs mining stage using gSpan algorithm. In each group, the discriminative set of sub-graphs are selected and fed to Deep Belief Network (DBN) f
... Show More