The purpose of this paper is to investigate Religious Human Rights Violations. Religious liberty is essential for everyone, everywhere. Because religion is significant to everyone, everywhere. Humans are religious by nature. Our nature drives us to seek answers to deep questions about ultimate things. We cannot live a fully human life unless we are free to seek those answers and live according to the truths we discover. In this study, the researcher used Marsh and White model for analysis A sample of an offensive image of an Islamic concept from the book "Mohammad believes it or else." this book is a comic book written by pseudonym Abdullah Aziz and published by Crescent Moon Publishing company. The book is marked with anti- Mohammad, prejudice expressed in willful attempts to devalue Prophet Muhammad in order to avert the urban public from Islam. Such as the story of the People of the Cave and many other stories in the Noble Qur’an is misused to vilify Islam and its Prophet which proves the violation of religious human rights. The researcher chose topic one, dubbed "Allah's monkey men," to analyze by employing the Marsh and White Model (2003) to analyze the image and refute the selected claims.
Antibacterial substances belong to a group of compounds that attack dangerous microorganisms. Therefore, killing bacteria or reducing their metabolic activity will lessen their adverse effects on a biological system. They originated from either synthetic materials, microbes, or mold. Many of these medications treat the gram-negative bacteria from the critical precedence group, such as pseudomonas, carbapenem-resistant acinetobacter, and enterobacterales. This study aims to investigate the simultaneous analysis of specific antibacterial spectrophotometrically. The WHO maintains this list of priority infections with antibiotic resistance. Drug combinations in single dosage forms are becoming increasingly popular in the pharmaceutical industry
... Show MoreThis research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions: Is it possible to examine praise poetry as a tagmeme? Is this analysis of great help in teaching English and Arabic to students in the College of Education? The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9. Each line in both English and Arabic data is numbered by the researcher herself. Then, those lines are grouped into sentences to facilitat
... Show MoreWar as a human phenomenon, has its own literature. Poetry is a major genre in this literature. This paper is an attempt to investigate and analyse some stylistic features in two selected, English and Arabic, war poems. These poems share the same theme.Both promote the principle of sacrificing one’s own life for the sake of homeland. This paper limits itself to analyse, thecontent words, tenses, semantic grouping of vocabulary and foregrounding in the two poems. The areas of analysis show great similarities in distributing the general content words (nouns, verbs, adjectives, and adverbs). In the analysis of the semantic areas of each content word, these poems reveal some similarities and some differences in their frequency rates.
... Show MoreThis study explores the language used in reporting political headlines conducting a rhetorical stylistic analysis. It is based on showing the effect of the rhetorical stylistic relations in news reporting. The aim is to investigate the structure adopted in reporting political news. It argues that the rhetorical stylistic devices are necessary and applicable to non-literary texts, i.e. political headlines to evaluate language use in the representation of non-literary texts. The analysis was carried out on data selected from the British broadsheet The Guardian and the American New York Times newspaper headlines. The data were examined and subjected to a contrastive analysis incorporating rhetorical and stylistic tools to discern h
... Show MorePathology reports are necessary for specialists to make an appropriate diagnosis of diseases in general and blood diseases in particular. Therefore, specialists check blood cells and other blood details. Thus, to diagnose a disease, specialists must analyze the factors of the patient’s blood and medical history. Generally, doctors have tended to use intelligent agents to help them with CBC analysis. However, these agents need analytical tools to extract the parameters (CBC parameters) employed in the prediction of the development of life-threatening bacteremia and offer prognostic data. Therefore, this paper proposes an enhancement to the Rabin–Karp algorithm and then mixes it with the fuzzy ratio to make this algorithm suitable
... Show MoreToday in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreAPDBN Rashid, Review of International Geographical Education Online (RIGEO), 2021
In this paper we will study some of the properties of an operator by looking at the associated S-act of this operator, and conversely. We look at some operators, like one to one operators, onto operators. On the other hand, we look at some act theoretic concepts, like faithful acts, finitely generated acts, singular acts, separated acts, torsion free acts and noetherian acts. We try to determine what properties of T make the associated S-act has any of these properties.