The present article concerns one of the objects of media sociology under construction. The transformation of the rites in the use of the television contents in the era of digital technologies and media convergence. By an analytic contextual approach, based on the study of the uses, we formulate the following hypothesis: so many changes in the rites of uses are real, in particular at the young people, so, many pieces integer of the everyday life remain impervious to these changes, and it is true under the influence of a slowness of the social and cultural orders, rooted for a long time in the traditional social fabric. We shall then try to bring a sociological look to this societal, cultural, and communicational object that is the passage of the reception television contents in the various digital platforms. This passage stands out nevertheless, a transformation in the media: the passage from the collective viewing in family to the personalized individual viewing.
Sociological dimension which underlies this transformation has for consequence the dismantling of the temporal structure of the consumption, by giving the possibility to the users to reorganize the television appointment, and to release them at the same time from the domestic space, the place where the practices are applies the social control by
means of the interactions public television.
« Old media are not beingdisplaced .Rather, their functions and statuses are shifted by the introduction of new technology.”(Jenkins, 2006)
Bis-anthraquinones with a unique molecular backbone, (+)-2,2’-epicytoskyrin A (epi) and (+)-1,1′-bislunatin (bis), was produced by endophytic fungi Diaporthe sp GNBP-10 associated with Gambir plant (Uncaria gambier). Epi and bis possess robust antimicrobial activity toward various pathogens. This study focus on knowing the optimum condition of epi and bis production from Diaporthe sp GNBP-10. A series of culture media with various nutrient compositions was investigated in epi and bis production. The content of epi and bis was determined by measuring the area under the curve from TLC-densitometric (scanner) experiment. The linear regression analysis was then applied to obtain the results. The optimi
... Show MoreThe reaction of LAs-Cl8 : [ (2,2- (1-(3,4-bis(carboxylicdichloromethoxy)-5-oxo-2,5- dihydrofuran-2-yl)ethane – 1,2-diyl)bis(2,2-dichloroacetic acid)]with sodium azide in ethanol with drops of distilled water has been investigated . The new product L-AZ :(3Z ,5Z,8Z)-2- azido-8-[azido(3Z,5Z)-2-azido-2,6-bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H-1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide was isolated and characterized by elemental analysis (C.H.N) , 1H-NMR , Mass spectrum and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the L-AZ withM+n: [ ( VO(II) , Cr(III) ,Mn(II) , Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) and Hg(II)] has been i
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreThis study examines Agence France Presse’s (AFP) media treatment of the Great Return Marches in order to identify its contents, the issues it gave attention to, its sources, attitude, techniques, objectives, the journalistic forms used in covering events and the typographic elements used to highlight them.
This descriptive study employed the survey methodology through the use of content analysis method, and the methodology of mutual relations through the use of the case study method. The data was collected by means of a content analysis form. The study was based on the Agenda Setting Theory in the analysis of the study results.
The study sample included (116) news texts from AFP collected during the period from 20/3/2018 to
This paper designed a fault tolerance for soft real time distributed system (FTRTDS). This system is designed to be independently on specific mechanisms and facilities of the underlying real time distributed system. It is designed to be distributed on all the computers in the distributed system and controlled by a central unit.
Besides gathering information about a target program spontaneously, it provides information about the target operating system and the target hardware in order to diagnose the fault before occurring, so it can handle the situation before it comes on. And it provides a distributed system with the reactive capability of reconfiguring and reinitializing after the occurrence of a failure.
Background: Inflammation of the brain parenchyma brought on by a virus is known as viral encephalitis. It coexists frequently with viral meningitis and is the most prevalent kind of encephalitis. Objectives: To throw light on viral encephalitis, its types, epidemiology, symptoms and complications. Results: Although it can affect people of all ages, viral infections are the most prevalent cause of viral encephalitis, which is typically seen in young children and old people. Arboviruses, rhabdoviruses, enteroviruses, herpesviruses, retroviruses, orthomyxoviruses, orthopneumoviruses, and coronaviruses are just a few of the viruses that have been known to cause encephalitis. Conclusion: As new viruses emerge, diagnostic techniques advan
... Show MoreThis work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show MoreImplementing smart community engagement should consider careful planning and collaboration with numerous stakeholders, including the community. The technology and program must be designed to frame its purpose and should link back to specific goals of implementing smart community engagement. Digital services do not guarantee a smart engagement between the community and the local government. This is the case for the Kubang Pasu local government where several online services have been provided in their attempt to implement the smart community concept. However, understanding on the preferences of features and requirements of existing web-based systems and the impact of these systems is lacking. Therefore, a perception study needs to be condu
... Show MoreProject management are still depending on manual exchange of information based on paper documents. Where design drawings drafting by computer-aided design (CAD), but the data needed by project management software can not be extracted directly from CAD, and must be manually entered by the user. The process of calculation and collection of information from drawings and enter in the project management software needs effort and time with the possibility of errors in the transfer and enter of information. This research presents an integrated computer system for building projects where the extraction and import quantities, through the interpretation of AutoCAD drawing with MS Access database of unit costs and productivities for the pricing and
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More