Language is essential for politics, for producing, disseminating, engaging with, and reacting to political discourse. The pragmatics of political speeches is crucial to the development of effective political communication tactics. Thus, speech is situated at the intersection of rhetoric, linguistics, and politics. In communication, intent is a pragmatic factor that plays a crucial role at the time of the communication process. Speech is of paramount importance to the social and political domains. Through the use of concepts and the relationship between language and politics, the study analyzes the function of language in communication and interpretation of intentions. The study of the relationships between language and the situations in which it is employed is the focus of the subfield of linguistics known as pragmatics. Politicians communicate directly with the public to persuade them to support their plans or beliefs. In this area, certain concepts of pragmatics can be applicable to the analysis of the political speeches demonstrates that political leaders conduct a variety of acts through their speeches. This article discusses the concept of Relation between Pragmatics and Politics, derived from its two basic components throughout linguistic concept. The authors attempt to identify elements or factors that interweave these two apparently separate spheres, by highlighting all the pragmatic concepts that can be included in the analysis of political discourses. In addition to giving an overview of the concept of political speeches and their relationship to the theory of pragmatism through the principle of analyzing the intentions of the politicians.
Modern automation robotics have replaced many human workers in industrial factories around the globe. The robotic arms are used for several manufacturing applications, and their responses required optimal control. In this paper, a robust approach of optimal position control for a DC motor in the robotic arm system is proposed. The general component of the automation system is first introduced. The mathematical model and the corresponding transfer functions of a DC motor in the robotic arm system are presented. The investigations of using DC motor in the robotic arm system without controller lead to poor system performance. Therefore, the analysis and design of a Proportional plus Integration plus Divertive (PID) controller is illustrated.
... Show MoreConfocal microscope imaging has become popular in biotechnology labs. Confocal imaging technology utilizes fluorescence optics, where laser light is focused onto a specific spot at a defined depth in the sample. A considerable number of images are produced regularly during the process of research. These images require methods of unbiased quantification to have meaningful analyses. Increasing efforts to tie reimbursement to outcomes will likely increase the need for objective data in analyzing confocal microscope images in the coming years. Utilizing visual quantification methods to quantify confocal images with naked human eyes is an essential but often underreported outcome measure due to the time required for manual counting and e
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show MoreExcessive water production is a persistent challenge in oil and gas wells, with polymer and gel solutions commonly employed for water control. This study investigates the rheological behaviour of cross-linked polyacrylamide gels and their impact on water shutoff treatment in gas wells. Rheological measurements, coreflooding experiments using Berea sandstone samples, and micromodel flow visualizations were conducted to evaluate gel performance. Results showed that during water injection, the water residual resistance factor ( Frrw ) decreases with increasing flow rates, mainly due to gel shear thinning behaviour and reduced residual gas saturation. Higher polymer concentrations in the gel enhance water permeability reduction. In contrast, un
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThis study focuses on the impact of technology on creating a dystopian world as presented by the English playwright Caryl Churchill in her play A Number (2002). This dramatic work came as a reaction to the most crucial and valuable turning point in the scientific achievements of human engineering, namely, the cloning of the sheep called Dolly. Therefore, A Number is a play that presents an analytical stage for imagining the biotechnological and scientific future. This dramatic vignette captures the playwright’s fears towards the abnormal progress of technology and science and how far such technological progress affects human relationships and identity. It also portrays how technological progress results in the feeling of a lack of
... Show More