Preferred Language
Articles
/
abaa-816
Semiotic criteria for analyzing religious symbols in press reports Qantara news site as a model
...Show More Authors

The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.

The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.

The survey method followed the method of surveying with the intentional sample, and this research belongs to the type of descriptive research by the qualitative method. the vertical to delve deeper into reaching the major connotations, and a set of results were reached, namely: the deep and superficial structures dominated the religious and political spirit, and the structures came in introductory and not confrontational formulas It tends to instill a spirit of reassurance more than confrontation, but it was not devoid of the style of intimidation, intimidation and threat, as well as expressions of coexistence, dialogue, peace and finding common ground between religions. To violence, as it followed the mechanism of invoking the special effects of the case from the external environment through a persuasive message that leads to modifying and activating the awareness of the recipient to obtain absolute conviction.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Guggulusome - A Novel Vesicular Carriers for Enhanced Transdermal Delivery
...Show More Authors

The present work describes guggul as a novel carrier for some anti-inflammatory drugs. Guggulusomes containing different concentration of guggul with aceclofenac were prepared by sonication method and characterized for vesicle shape, size, size-distribution, pH, viscosity, spread ability, homogeneity, and accelerated stability in-vitro drug permeation through mouse skin. The vesicles exhibited an entrapment efficiency of 93.2 ± 12%, vesicle size of 0.769 ± 3μm and a zeta potential of - 6.21mV. In vitro drug release was analyzed using Franz’s diffusion cells. The cumulative release of the guggulusomes gel (G2) was 75.8% in 18 hrs, which is greater than that all the gel formulation. The stability profile of prepare

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Academia Open
Positioning Preterm Newborns for Cardiorespiratory Stability A Global Insight
...Show More Authors

Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Podophyllin (10%) Ointment: A New Therapeutic Modality for Psoriasis
...Show More Authors

KE Sharquie, AA Noaimi, WK Al-Janabi, Journal of Cosmetics, Dermatological Sciences and Applications, 2013

View Publication
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
A new achromatic glass for near infrared laser instruments
...Show More Authors

This research investigates new glasses which are best suitable for design of optical systems
working in the infrared region between 1.01 to 2.3μm. This work is extended to Oliva & Gennari
(1995,1998) research in which they found that the best known achromatic pairs are (BAF2-IRG2; SRF2-
IRG3; BAF2-IRG7; CAF2-IRGN6; BAF2-SF56A and BAF2-SF6). Schott will most probably stop the
production of these very little used and commercially uninteresting IRG glasses. In this work equally
good performances can be obtained by coupling BAF2, SRF2&CAF2 with standard glasses from Schott
or Ohara Company. The best new achromatic pairs found are (SRF2-S-TIH10; CAF2-S-LAL9; CAF2-SLAL13
and CAF2-S-BAH27). These new achromatic pai

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Framework for Predicting Airfare Prices Using Machine Learning
...Show More Authors

Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Deci

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Journal Of Engineering
Methods for Removing Dyes from Polluted Water; A Review
...Show More Authors

Most of the water pollutants with dyes are leftovers from industries, including textiles, wool and others. There are many ways to remove dyes such as sorption, oxidation, coagulation, filtration, and biodegradation, Chlorination, ozonation, chemical precipitation, adsorption, electrochemical processes, membrane approaches, and biological treatment are among the most widely used technologies for removing colors from wastewater. Dyes are divided into two types: natural dyes and synthetic dyes.

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
International Journal Of Pure And Apllied Mathematics
A SEMI ANALYTICAL ITERATIVE TECHNIQUE FOR SOLVING DUFFING EQUATIONS
...Show More Authors

View Publication
Crossref (13)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref