This research is aimed at identifying the communicative habits and the impact of the content on the communicative process, especially the youth audience, which is one of the most important categories to which the advertisement is directed, as young people face life with passion and aspiration that make then responsive to all the influences used by the media in designing advertisements which use all the techniques and methocls to attract young people, such as relying on drama , artistic tricks, musical phrases and advertising slogans that respond to the desire of young people in entertainment.
The research aims to identify the reflection of television advertising and its impact on the development of the cognitive abilities of university youth as well as identify the most prominent effects that have been reflected on them. The researcher used the descriptive method, which allows him to survey the performance of the communicative medium and the communication message together in accordance with the research requirements. The research uses the questionnaire as a field to explore their views on the subject of university youth exposure to television advertising and its reflection on the development of their cognitive abilities.
The research has reached many conclusions, the most important of which is that television advertising has a positive impact on university youth in developing their cognitive abilities and a great role in teaching students how to convince and attract others, and the nature of television advertising requires a high mental level of thinking, understanding and enhancing information among students
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreUltraviolet spectrophotometric studies for antibiotic (amino glycoside) derivatives including, Neomycin, Streptomycin, Gentamycin and Kanamycin with special reagents, which are benzoyl chloride; benzene sulfonyl chloride, toluenesulfonyl chloride and phthalic anhydride were made. Amino glycosides derivatives were followed through measurements of the ultraviolet absorbance (A) from which the absorptivity (ε) of the complexes was deduced and molar absorbances using Ultraviolet for products and calculate the number of reagents molecule that combine to amino glycosides.
Hydrogen sulfide removal catalyst was prepared chemically by precipitation of zinc bicarbonate at a controlled pH. The physical and chemical catalyst characterization properties were investigated. The catalyst was tested for its activity in adsorption of H2S using a plant that generates the H2S from naphtha hydrodesulphurization and a unit for the adsorption of H2S. The results comparison between the prepared and commercial catalysts revealed that the chemical method can be used to prepare the catalyst with a very good activity.
It has observed that the hydrogen sulfide removal over zinc oxide catalyst follows first order reaction kinetics with activation energy of 19.26 kJ/mole and enthalpy and e
... Show MorePerchloroethylene (PERC) is commonly used as a dry-cleaning solvent, it is attributed to many deleterious effects in the biological system. The study aimed to investigate the harmful effect associated with PERC exposure among dry-cleaning workers. The study was carried out on 58 adults in two groups. PERC-exposed group; include thirty-two male dry-cleaning workers using PERC as a dry-cleaning solvent and twenty-six healthy non-exposed subjects. History of PERC exposure, use of personal protection equipment (PPE), safety measurement of the exposed group was recorded. Blood sample was taken from each participant for measurement of hematological markers, liver and kidney function tests. The results showed that 28.1% of the workers were usin
... Show MoreEmpirical equations for estimating thickening time and compressive strength of bentonitic - class "G" cement slurries were derived as a function of water to cement ratio and apparent viscosity (for any ratios). How the presence of such an equations easily extract the thickening time and compressive strength values of the oil field saves time without reference to the untreated control laboratory tests such as pressurized consistometer for thickening time test and Hydraulic Cement Mortars including water bath ( 24 hours ) for compressive strength test those may have more than one day.
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe goal of this article is to construct fibrewise w-compact (resp. locally w-compact) spaces. Some related results and properties of these concepts will be investigated. Furthermore, we investigate various relationships between these concepts and three classes of fibrewise w-separation axioms.