It has become familiar to see alchemy as a methodological approach that combines conscious, diverse, psychological, social, structural, and discrete approaches in the communications technology that Marshall McLuhan found to be able to extend our bodies and senses, The media discourse has a deep and superficial structure produced by the first, with its social, cultural and historical backgrounds, in a context that connects the image with the word, as the "meanings are made" - everywhere, as described by Jonathan ) In fashion, in the arts as a whole, and from its "signs" Our analysis of «meaning», in the media, and communication through advertising, magazines, newspapers, television, and the Internet. Therefore, alchemy is preoccupied with how the signs work, their relation to each other and to the specific community, individuals and to each variable (ethnographic), which varies according to their culture and hobby.
Which widens the field of alchemy to a wider range than its specific structure, but opens up to different codes, structures and conflicting ideologies where it reads (signs) in different ways and is compatible with other texts.
Here, the semiotics impose a special methodological adjustment, because of the clash of the many meanings, and the intersection of them in one point, and one time, which makes us pursue these meanings, flowing, to take a position, or a specific interpretation or interpretation from different reception angles to the audience of readers, In the form of analysis and synthesis, and the reintroduction of the media (incident), in the multiplication of identities, their transformations, fixed and transformative patterns, virtual and virtual self-formation with the unrealistic, ) Come on To create the human of the present century for the broadcast of new values in the media culture, and remain the active actor, between the actors of the methodology is also effective, as you intend to go into the problems, and explain one aspect of a coherent analytical approach.
A new ligand N-(methylcarbamothioyl) acetamide (AMP) was synthesized by reaction of acetyl chloride with adenine. The ligand was characterized by FT-IR, NMR spectra and the elemental analysis. The transition metal complexes of this ligand where synthesize and characterized by UV-Visible spectra, FT-IR, magnetic suscepility, conductively measurement. The general formula [M(AMP)2Cl2], where M+2 = (Mn, Co, Ni, Cu, Zn, Cd, Hg).
Let R be a ring with 1 and W is a left Module over R. A Submodule D of an R-Module W is small in W(D ≪ W) if whenever a Submodule V of W s.t W = D + V then V = W. A proper Submodule Y of an R-Module W is semismall in W(Y ≪_S W) if Y = 0 or Y/F ≪ W/F ∀ nonzero Submodules F of Y. A Submodule U of an R-Module E is essentially semismall(U ≪es E), if for every non zero semismall Submodule V of E, V∩U ≠ 0. An R-Module E is essentially semismall quasi-Dedekind(ESSQD) if Hom(E/W, E) = 0 ∀ W ≪es E. A ring R is ESSQD if R is an ESSQD R-Module. An R-Module E is a scalar R-Module if, ∀ , ∃ s.t V(e) = ze ∀ . In this paper, we study the relationship between ESSQD Modules with scalar and multiplication Modules. We show that
... Show MoreBioethanol produced from lignocellulose feedstock is a renewable substitute to declining fossil fuels. Pretreatment using ultrasound assisted alkaline was investigated to enhance the enzyme digestibility of waste paper. The pretreatment was conducted over a wide range of conditions including waste paper concentrations of 1-5%, reaction time of 10-30 min and temperatures of 30-70°C. The optimum conditions were 4 % substrate loading with 25 min treatment time at 60°C where maximum reducing sugar obtained was 1.89 g/L. Hydrolysis process was conducted with a crude cellulolytic enzymes produced by Cellulomonas uda (PTCC 1259).The maximum amount of sugar released and hydrolysis efficiency were 20.92 g/L and 78.4 %, respectively. Sugars
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreA simple, accurate and sensitive spectrophotometric method for the determination of Procaine penicillin (PP) is described. The method is based on charge-transfer reaction of PP with metol (N-methyl-p-hydroxy aniline) in the presence of ferric sulphate to form a purple-water soluble complex ,which is stable and has a maximum absorption at 510 nm .A graph of absorbance versus concentration shows that Beer’s low is obeyed over the concentration range of 3-80 µg /ml of PP (i.e.,3-80 ppm) with a molar absorbativity of 4.945 ×103 L.mol-1.cm-1 ,Sandell sensitivity of 0.1190 µg cm-2 ,a relative error of (-1.57)-2.79 % and a standard deviation of less than 0.59 depending on the concentration of PP.The optimum conditions for full co
... Show MoreAfter Zadeh introduced the concept of z-number scientists in various fields have shown keen interest in applying this concept in various applications. In applications of z-numbers, to compare two z-numbers, a ranking procedure is essential. While a few ranking functions have been already proposed in the literature there is a need to evolve some more good ranking functions. In this paper, a novel ranking function for z-numbers is proposed- "the Momentum Ranking Function"(MRF). Also, game theoretic problems where the payoff matrix elements are z-numbers are considered and the application of the momentum ranking function in such problems is demonstrated.
This study is concerned with the derivation of differential equation of motion for the free coupled vertical – torsional and lateral vibration of opened thin-walled curved beams. The curved beam to be considered in this study is of isotropic opened thin – walled (I) section with equal top and bottom flanges. The derivation depends on Hamilton's principle which required finding the potential and kinetic energy of the curved beam section due to internal stresses and all types of movements (Vertical,Torsional and Lateral) .The effect of restrained warping displacement is also considered in this study. Three differential equations are derived for vertical, torsional and lateral movement .and approximate solutions are developed by using the
... Show MoreMetadiscourse markers are means for organizing a writer’s information and create a connection with her/his readers. When students write, they usually focus on one type of these markers that is the interactive markers and belittling the use of the other type which is the interactional markers. That is to say, they emphasize on presenting and organizing their information only. Therefore, this study is conducted to bridge this gap. The researchers have selected 18 thesis abstracts. Nine of them are written by Iraqi students of English and the rest by American students. The aims of the study are to examine the types and sub-types of metadiscourse markers used by American and Iraqi students; investigate comparatively the impact of the metad
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More