This study aims to examine the main features of the new trends in agenda studies using the secondary analytic approach in analyzing the newest studies in agenda-setting issues from 2007 till 2017, in addition to the quantitative approach.
The researcher has analyzed 110 studies -75 foreign and 35 Arabic - to determine, describe and evaluate the key research trends which came in Arabic and foreign agenda-setting studies. The results confirmed that studies of the agenda theory are increasing steadily worldwide with diversity in the theoretical trends and used research tools. In addition, primary studies focus on content analysis and the survey approach (method). Also, most Arabic agenda-setting studies used the traditional methods and known research tools such as content analysis and survey, contrary to the foreign studies conducted in the same field where they were characterized by the different research teams specializing in many scientific branches. The study recommends more cooperation among Arab researchers and the re-survey of the research map in fields of agenda studies. It also recommends giving more attention to comparative studies, revising the used methods and tools and focusing more on interdisciplinary studies through different timespans (periods).
A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MoreBackground. In cases of spontaneous subarachnoid haemorrhage (SAH) with multiple intracranial aneurysms (MIAs) detected on angiography, some radiological clues assist in determining the site of a ruptured aneurysm which is bleeding is quite beneficial for the selection of the best treatment strategy. Case description. We report a case of a 60 years old patient who presented with spontaneous SAH, sellar hematoma, and three different aneurysms detected in angiography. Although the right Posterior communicating artery (PcomA) aneurysms showed Murphy’s teat on angiography intraoperatively, we discovered that the right superior hypophyseal aneurysm (SHA) was the source of the index bleeding. Both aneurysms were clipped successfully. Co
... Show MoreIn this paper we proposes the philosophy of the Darwinian selection as synthesis method called Genetic algorithm ( GA ), and include new merit function with simple form then its uses in other works for designing one of the kinds of multilayer optical filters called high reflection mirror. Here we intend to investigate solutions for many practical problems. This work appears designed high reflection mirror that have good performance with reduction the number of layers, which can enable one to controlling the errors effect of the thickness layers on the final product, where in this work we can yield such a solution in a very shorter time by controlling the length of the chromosome and optimal genetic operators . Res
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreNewly series of 6,6’-((2-(Aryl)dihydropyrimidine-1,3(2H,4H)-diyl)bis(methylene))bis(2-methoxy phenol) (3a-i) were synthesized from cyclization of 6,6’-((propane-1,3-diylbis (azanediyl)) bis(methylene)) bis(2-methoxyphenol) with several aryl aldehyde in the presence of acetic acid. The newly compounds characterized from their IR, NMR and EIMs spectra. The antioxidant capacity of these compounds screened by utilizing DPPH and FRAP assays. Compounds 3g and 3i exhibited significant antioxidant capability in both assays. Docking study for these compounds as a potential inhibitors of gyrase enzyme were carried out. Compound 3g exhibited significant inhibition with binding free energies (DG) higher than novobiocin. compounds 2, 3a, 3b, 3
... Show MoreA novel series of chitosan derivatives were synthesized via reaction of chitosan with carbonyl compounds and grafted it’s by with different amine compounds substituted hydrogen. The produced polymers were characterized by different analyses FTIR, 1HCNMR, XRD, DSC and TGA. Solubility in water as well as many solvent was investigated, antibacterial activity of chitosan and its derivatives against two types of bacteria E. coli and S. aureus was also investigated. The results showed that derivatives sort of have antibacterial activities against Esherichia coli (Gram negative) better than chitosan whilst compound IX has better antibacterial against Staphylococcus aureus (Gram positive). SEM analysis showed that increase of surface roughness wi
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreFive membered heterocyclics derivatives were synthesized in this work by three routes. The first route includes the synthesis of N-benzoic acid 1,2,3,-triazole derivatives (3),(4) by diazotation of methyl-2-amino benzoate and treating the resulted salt (1) with sodium azide and ethyl acetoacetate or acetyl acetone, respectively. In the second route, derivatives of pyrazole (8) pyrazolin-5-one (9), (10) were prepared by the reaction of the salt (1) with some active methylene compounds to give the corresponding hydrazones derivatives (5-7) which then they were treated with hydrazine hydrate. The third route afforded the synthesis of three derivatives (12), (15a), (15b) of thiazolidinone by two different methods. AII compounds were confirmed b
... Show MoreNew 2-amino thiazole ,oxodiazole, sulphonilamide and diazin derivatives of N-(α-chloro aceto)-3-(tolyl imino)-5-bromo-2-oxo-indole(2) have been synthesized .The preparation process started by the reaction of 5-bromo isatin with P-toluidine in the presence of glacial acetic acid and dimethylformamide(DMF) as a solvent to give 3-(tolyl imino)5-bromo-1H-indole-2-one.(1), Compound (1) with sodium hydride in dimethylformamide(DMF) at 0C0 gave a suspension of the sodium salt of Schiff base derivative and subsequent reaction with monochloroacetylchloride obtained the intermediate compound(2).Compound(2) was reacted with different reagents in four routes.The first route involved direct reaction with substituted 2-aminobenzothiazole u
... Show MoreIn recent years, there has been a significant increase in research demonstrating the new and diverse uses of non-thermal food processing technologies, including more efficient mixing and blending processes, faster energy and mass transfer, lower temperature and selective extraction, reduced thermal and concentration gradients, reduced equipment size, faster response to extraction control, faster start-up, increased production, and a reduction in the number of steps in preparation and processing. Applications of ultrasound technology have indicated that this technology has a promising and significant future in the food industry and preservation, and there is a wide scope for its use due to the higher purity of final products and the
... Show More