Preferred Language
Articles
/
abaa-208
Young People between Traditional Media and New Media
...Show More Authors

This Research based on an empirical study and tested the hypothesis of transition effects on a sample of young people in Sharjah University and trying to identify a new form of Media which is based on the production of new types of habits and patterns and their cultural impact. Recently, New Media appeared to refer to new types of Communication using the Internet. It’s enormous in the exchange of Information. The new Media contains multiple forms, including the form in which users produce by them to refer the entry of a new area of Media in which exchange of roles between the Sender and the recipient.

This study is trying to identify a new form of Media Web used (Press online or only Press online, Digital Radio and the Web-Sat) and to compare these with Traditional Media (Newspapers, Classic Radio and the Analogical TV). Why the University Students like, the Traditional Media or the new Media?

In conclusion, New Media is the main actor which constructs specific concepts relating to identifying. Most of the time Universities Students Used for the famous Media such as Digital TV or Media Interactivity. This is influenced by the latest on the educational achievement of students.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Study and Analysis the Mathematical Operations of Fuzzy Logic
...Show More Authors

The last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Science International
USING CRYPTOANALYSIS POLICIES AND TECHNIQUES TO CREATE STRONG PASSWORD
...Show More Authors

Publication Date
Wed Dec 01 2021
Journal Name
Journal Of International Studies
Emergence and developing united Arab of Emirates nuclear program
...Show More Authors

United Arab of Emirates made efforts in developing workforce in the field of nuclear energy that it had a chance to attract specialized of this field that it reflect growth in every field of life through which it take special procedures to face casas as fokoshima .the state had started to apply the UAE peaceful nuclear program by opening (Baraka)station in 2010 as to be the first in the Arab world to aim to enhance and diversification energy sources of electricity there in addition to enhance the state’s efforts to achieve economic refreshing and environmental protect.

View Publication Preview PDF
Publication Date
Mon Oct 04 2021
Journal Name
Palarch’s Journal Of Archaeology Of Egypt
GEORGE MASON AND THE VIRGINIA BILL OF RIGHTS 1776
...Show More Authors

After the persistence of the British policy of oppression and control over the American colonies and the attempts to obliterate the identity of their inhabitants, the colonies worked on moving forward towards achieving independence, and Virginia was the first to initiate the development of the new government frameworks, through George Mason in drafting the Virginia Bill of Rights in 1776, which expressed the philosophy of the era Enlightenment and independent revolutionary thought, which called for equality and natural rights for individuals and the need for a free popular government that works for the common good.

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Italian Journal Of Pure And Applied Mathematics
Duality of St-closed submodules and semi-extending modules
...Show More Authors

The main goal of this paper is to dualize the two concepts St-closed submodule and semi-extending module which were given by Ahmed and Abbas in 2015. These dualizations are called CSt-closed submodule and cosemi-extending mod- ule. Many important properties of these dualizations are investigated, as well as some others useful results which mentioned by those authors are dualized. Furthermore, the relationships of cosemi-extending and other related modules are considered.

View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Mon Oct 01 2012
Journal Name
Iraqi Journal Of Physics
Structural and electrical properties of CdO/porous-Si heterojunction
...Show More Authors

The electrical properties of CdO/porous Si/c-Si heterojunction prepared by deposition of CdO layer on porous silicon synthesized by electrochemical etching were studied. The structural, optical, and electrical properties of CdO (50:50) thin film prepared by rapid thermal oxidation were examined. X-ray diffraction (XRD) results confirmed formation of nanostructured silicon layer the full width half maximum (FWHM) was increased after etching. The dark J-V characteristics of the heterojunction showed strong dependence on etching current density and etching time. The ideality factor and saturation current of the heterojunction were calculated from J-V under forward bias. C-V measurements confirmed that the prepared heterojunctions are abrupt

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2009
Journal Name
Bayt Alhekma
COMPARATIVE ANALYSIS OF RUSSIAN AND ARABIC PHRASEOLOGICAL UNITS (TURNS)
...Show More Authors

Abstract The study aimed at reviewing translation theories proposed to address problems in translation studies. To the end, translation theories and their applications were reviewed in different studies with a focus on issues such as critical discourse analysis, cultural specific items and collocation translation.

Publication Date
Mon Jul 01 2013
Journal Name
Political Sciences Journal
Bahraini Parliamentary Elections and their Impact on the Popular
...Show More Authors

الخلاصة Bahraini Parliamentary Elections and their Impact on the Popular Uprising) Bahrain has a distinguished constitutional and parliamentary experience, which distinct it from the other Gulf Cooperation Council (GCC) countries. Its experience in this area is the second after the experience of Kuwait to establish a system of government based on modern constitutional principles. As the government presented the Constitution to the Constituent Assembly elected by people and approved in 09/06/1973. After that, it witnessed the birth of the first parliament elected by the people in 1973, but the experiment did not last long and the parliament dissolved by Prince, and didn’t determine the period of the return of the working with the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Laplace Distribution And Probabilistic (bi) In Linear Programming Model
...Show More Authors

The theory of probabilistic programming  may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, pro­duction and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More