It is a well-known fact that publishing companies spend much money, time and energy in designing their book covers to attract potential customers. As the first thing people do when they buy or intend to buy a book is looking at its front cover. However, if there is a need to know more about the book, people usually look at the information on its back cover. This paper attempts to explore the persuasive function of blurbs beyond the constraints of the academic domain and consequently their connection with advertising discourse in two main sections: The first presents the concept of blurb and its structure while the second defines persuasion and shows the most prominent strategiesused in blurbs. Finally, this paper gives the conclusion that the blurb is a persuasive text as it aims to influence others to buy the book and therefore, blurb is a type of advertising.
Granular carbon can be used after conventional filtration of suspended matter or, as a combination of filtration - adsorption medium. The choice of equipment depends on the severity of the organic removal problem, the availability of existing equipment, and the desired improvement of adsorption condition.
Design calculations on dechlorination by granular - carbon filters considering the effects of flow rate, pH , contact time, head loss and bed expansion in backwashing , particle size, and physical characteristics were considered assuming the absence of bacteria or any organic interface .
Catalytic reforming of naphtha occupies an important issue in refineries for obtaining high octane gasoline and aromatic compounds, which are the basic materials of petrochemical industries. In this study, a novel of design parameters for industrial continuous catalytic reforming reactors of naphtha is proposed to increase the aromatics and hydrogen productions. Improving a rigorous mathematical model for industrial catalytic reactors of naphtha is studied here based on industrial data applying a new kinetic and deactivation model. The optimal design variables are obtained utilizing the optimization process in order to build the model with high accuracy and such design parameters are then applied to get the best configuration of this pro
... Show Moreملخص البحث باللغة الإنجليزية
The concept of the phenomenon of nuns: an analytical ideological study
Dr. Samia bint Yassin Al-Badri
Department of Islamic Doctrine & Contemporary Ideologies
College of Shariʿah & Islamic Studies
Qassim University
The study of concepts is one of the main pillars of doctrinal studies, in order to understand the formation of the concept, and to understand its contexts in religious sources, in order to be systematically criticized; So, this research came with the title:
The concept of the phenomenon of nuns, an analytical doctrinal study
The study concluded with resu
... Show MorePolitical speeches are represented in different shapes as political forum, events or as inaugural speech. This research critically analyzes the inaugural Speech of the President Donald Trump which was delivered on 20th ,January, 2017 from the site<www.cnn.com> retrieved on 10th ,May,2017. The objectives of the study are: First: classifying and discussing well known micro structures (linguistic feature) of the speech, and second: classifying the macro structures i.e. the delivered political inaugural speech in which he includes social structures. To reach to the objectives of the study, the researcher will adopt Norman Fairclough’s three dimensional Analytical Model(
... Show MorePolitical speeches are represented in different shapes as political forum, events or as inaugural speech. This research critically analyzes the inaugural Speech of the President Donald Trump which was delivered on 20th ,January, 2017 from the site<www.cnn.com> retrieved on 10th ,May,2017. The objectives of the study are: First: classifying and discussing well known micro structures (linguistic feature) of the speech, and second: classifying the macro structures i.e. the delivered political inaugural speech in which he includes social structures. To reach to the objectives of the study, the researcher will adopt Norman Fairclough’s three dimensional Analytical Model(1989). Tracing the model, the speech was subm
... Show MoreThis research seeks to try to address one of the important issues in society that prevents the state from achieving its social, economic, political and financial goals, represented by the low tax proceeds, through which it can achieve those goals. What is reflected on the tax proceeds, knowing that the General Tax Authority does not take into account the issue of analyzing the opportunity cost of corporate capital as one of the profit indicators when setting the annual controls, which leads to a decrease in the tax proceeds, and therefore the research objective will be to shed light on the importance of adopting the concept of analysis The opportunity cost by the General Tax Authority to achieve a tax proceeds commensurate with t
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.