Communication has seen a big advancement through ages; concepts, procedures and technologies, it has also seen a similar advancement of language. What unites language and media is the fact that each one of them guides and contributes to the other; media exists and results from language and from the other sign systems, and what strengthens this connection is the symbolic language system, as media helps it by providing knowledge and information. The change that occurred through time must leave a significant trace in the media, for example Diction, which has changed concerning development and growth, also the ways and mediums of media have become manifold and widespread. This change affected the recipient whether it was a reader, listener or watcher; as diction became no longer read in written paragraphs where punctuation rules are respected, it neither became a representation of the meaning in an attempt to be described, but it is rather another picture represented with words and performance, along with a deep knowledge of the language’s characteristics, especially oral characteristics, As do appear the personal and phonetic features of maintaining signaling systems: word system, sentence system, text system, speech system. The modern science of language has encouraged the responsables of communication to make use of the tremendous achievements of our times since the beginning of the 20th century, especially in the development of semiotics, which became sign of this century’s development. Whilst, Linguistics is trying to summarize the special minor signifying units from the sentence. Semiotics occupies a decent position, as it aims to extrapolate the semantic system according to a unit larger than the sentence, that is the speech from which there is no benefit simply by just adding the minor signifying units that construct it. However, it is extracted
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreCurrent search problem manifested and widows who community harsh to bear hardships and pains، The goals of continuing the sustainability of life and take responsibility, and especially in light of the difficult circumstances in which Iraq is going through, and the displacement of murder and terrorism, which generated huge numbers of widows and orphans Because of the loss of a breadwinner and which became women and children are the most harm to the victim and as a result of wars and armed tendencies So this research is an important and vital topic opens our horizons important for overlapping roles of women widows and their impact on the achievement and status of Iraqi women and that as long as aptly characterized and their ability to end
... Show MoreThe present research aims to identify and define the basic dimensions of the information management strategy and the administrative creativity in the Faculty of Management and Economics / the University of Kirkuk, as well as the role played by the dimensions of the information technology management strategy in achieving the administrative innovation in the college and the research problem was formulated in several questions. The research problem was formulated in several questions centered on the correlation between the research variables, and the research was based on a major hypothesis and five sub-hypotheses emerged from which it was subjected to several tests to ensure its validity. The researcher used the descriptive-analyti
... Show MoreThis study aims to design unified electronic information system to manage students attendance in Lebanese French university/Erbil, as a system that simplifies the process of entering and counting the students absence, and generate absence reports to expel students who passed the acceptable limit of being absent, and by that we can replace the traditional way of using papers to count absence, with a complete electronically system for managing students attendance, in a way that makes the results accurate and unchangeable by the students.
In order to achieve the study's objectives, we designed an information syst
... Show MoreBackground: Pomegranate (punicagranatum L, Punicaceae), is an edible fruit consumed around the world. The edible part of pomegranate is rich in compounds that possess antioxidant and anti-inflammatory activities. The aim of this study is to investigate the antioxidant; anti-inflammatory and gingival wound healing effects of Punicagrantum L. seed extract oral supplementation in rabbit. Methods and Methods: Forty five male rabbits were divided into 3 groups, base line (5 rabbits) left without buccal gingival wound as( group 1),study group, 20 rabbits (group2) with buccal gingival wound treated with ethanolic extract of Punicagranatum L. seed extract and control, 20 rabbits (group 3) with buccal gingival wound only. Buccal gingival wounds w
... Show MoreThis study examined the imperative construction: the command, the interrogative, the prohibition, the call, and the wish. In the Diwan of Al-Shamakh bin Dirar; where the poetic verses were monitored in each of the topics of the student's creation, and the rhetorical meanings that he came out with. What is new in this study is that it is the first to study the demanded composition in the poetry of a glorious poet, Al-Shammakh bin Dirar Al-Dhubyani. As his poetry did not receive such a study, it sought to employ what was written by rhetoric scholars, in an attempt to explore the demanded composition in the poetry of Al-Shamakh. The study adopted the descriptive analytical approach, which is based on counting the number of times the poet us
... Show MoreThe aim of the present research is to measure the degree of strategic effectiveness (fahs) in the development of grammar skills of high school students in the Kingdom of Saudi Arabia and to achieve the goal of the researcher the researcher used the semi-experimental approach; On ten arbitrators specializing in grammar, morphology, curricula and methods of teaching the Arabic language. After confirming the validity of the guideline, the researcher prepared an achievement test consisting of (22) paragraphs of the type of short answer and multiple choice. The researcher trained a teacher to apply the strategy to the experimental research sample using the (screening) component of (30) students, and the same parameter taught the control sampl
... Show MoreThe book The Laws of Duwan of Mamati's Son (T, 606 E) His approach to his narratives is a topic of historical and civilized importance. The Fatimid Age of the People of Jehovah has expanded its influence and authority, including ministers, writers, doughnuts and foreshores. One of the Christian families that shined in the late Fatmi era was "Mamati", who lived in "Assiut" from Upper Egypt, then moved to Cairo, and enrolled in the service of the Fatimids, where their sons held important positions in State offices.Ibn Mamati became in charge of the Army Office and then added to it the Finance Office, which became the most important downs in Egypt. Through his work in the Duwan Law Books, this book was a living record of the Dawawans in the Ay
... Show MoreThis study aims to know the degree of importance and the availability of the enhancing specifications of the educational process, and the way its objectives are achieved. Such a step involves using educational techniques, laying the selection foundations, knowing the methods of their employment and tracking the obstacles that limit this employment in teaching Arabic to non-native speakers. To achieve these objectives, the study followed a descriptive approach, and collected the necessary data through an integrated questionnaire prepared for the purpose of describing the phenomenon or topic. This approach was adopted, as it is characterized by being comprehensive, focuses on collecting data related and necessary to the topic under study.
... Show MoreIn this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.