Communication has seen a big advancement through ages; concepts, procedures and technologies, it has also seen a similar advancement of language. What unites language and media is the fact that each one of them guides and contributes to the other; media exists and results from language and from the other sign systems, and what strengthens this connection is the symbolic language system, as media helps it by providing knowledge and information. The change that occurred through time must leave a significant trace in the media, for example Diction, which has changed concerning development and growth, also the ways and mediums of media have become manifold and widespread. This change affected the recipient whether it was a reader, listener or watcher; as diction became no longer read in written paragraphs where punctuation rules are respected, it neither became a representation of the meaning in an attempt to be described, but it is rather another picture represented with words and performance, along with a deep knowledge of the language’s characteristics, especially oral characteristics, As do appear the personal and phonetic features of maintaining signaling systems: word system, sentence system, text system, speech system. The modern science of language has encouraged the responsables of communication to make use of the tremendous achievements of our times since the beginning of the 20th century, especially in the development of semiotics, which became sign of this century’s development. Whilst, Linguistics is trying to summarize the special minor signifying units from the sentence. Semiotics occupies a decent position, as it aims to extrapolate the semantic system according to a unit larger than the sentence, that is the speech from which there is no benefit simply by just adding the minor signifying units that construct it. However, it is extracted
After the information revolution that occurred in the Western world, and the developments in all fields, especially in the field of education and e-learning, from an integrated system based on the effective employment of information and communication technology in the teaching and learning processes through an environment rich in computer and Internet applications, the community and the learner were able to access information sources and learning at any time and place, in a way that achieves mutual interaction between the elements of the system and the surrounding environment. After the occurrence of the phenomenon of Covid 19, it led to a major interruption in all educational systems that had never happened before, and the disrupt
... Show MoreResearch summary
Informing means informing and informing, which is conveying information to someone and confirming his narration with it. Accordingly, information is its main content..and it has multiple means, including visual, audio and read, and it has become the dominant role in the process of socialization, and much of what we hear, read, or watch in the media is not devoid of a goal, and expresses that scientifically as “charged with values” ( Value Loaded)..Values that are: the set of beliefs that the individual holds towards things, meanings, and various aspects of activity, which direct his desires and attitudes towards them, and determine for him acceptable and unacceptable behavior, right and wrong, and all of this
... Show MoreThe research (The Aesthetics of Lumia Art in Contemporary Textile Arts: An Analytical Study) included four chapters, the first to explain the research problem summarized by the question: Does the art of Lumia achieve aesthetic values in contemporary textile arts?, and aims to: Identify the aesthetics of Lumia art and its applied uses in contemporary textile arts, within the time period (2013-2022). The third chapter included: research procedures and sample analysis (4) models according to the descriptive analytical approach, and the fourth chapter dealt with: results, conclusions and recommendations as well as sources.
The topic area of that’s paper dealing with regionalism hegemony upon ruling affairs and political life in Tunisia, this phenomena had historical origins, even before region of French occupation in 1881, after independence, the regionalism domination was practice and normal, the political system justified it's with many causes, like level of education, connection with Western civilization, enlighten intelligent, economic conditions in coast region and North of Tunisia compared with the South, also the role of President Bourqiba as founder of Modern Tunisia, he was from Monster (North of country) which was dominated as charismatic leader dedicate the regionalism domination through decades, yet after revolution in 2011, little changes ha
... Show MoreThe problem of the tagged research (experimentation in the works of the artist Muhammad al-Kinani is an analytical study) dealt with the nature of the concept of experimentation and its work in the works of Muhammad al-Kinani. Which adopts the removal of the concept of style and artistic style and takes the experience away from the pattern of repetition The importance of the research comes through the identification of the materials founding the artistic work. The current research benefits the specialists in the field of arts from the students of studies with a new and renewed formulation of creativity. The research objectives shed light on the contemporary experiences of the artist Muhammad Al-Kinani and its importance in benefiting res
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show More