This study explores the language used in reporting political headlines conducting a rhetorical stylistic analysis. It is based on showing the effect of the rhetorical stylistic relations in news reporting. The aim is to investigate the structure adopted in reporting political news. It argues that the rhetorical stylistic devices are necessary and applicable to non-literary texts, i.e. political headlines to evaluate language use in the representation of non-literary texts. The analysis was carried out on data selected from the British broadsheet The Guardian and the American New York Times newspaper headlines. The data were examined and subjected to a contrastive analysis incorporating rhetorical and stylistic tools to discern how they are united to achieve the main purpose of language use, i.e. to persuade and grasp the reader's attention. It was found that the two newspapers tend to employ sentence structures differently in terms of nucleus and satellite relations demonstrating the significant part in a sentence. Examples of the deviation strategy of foregrounding were primarily established in the New York Times to maintain the reader's attention about the content underlying the different strategy of the two newspapers to report war circumstances. The analysis shows that rhetorical devices and stylistic features are found and closely related in newspaper articles.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe follower of the history of cinema in the world notes that cinema started recording one and these films are varied in their subjects, while the life of man was the material of these films to be in a creative artistic style.
If the Palestinian films produced by Palestinian directors do not have an impact on the local, Arab and international levels, this is due to the weakness in several technical fields or with the intention to make them bad or negligence of those who produce these films.
This research deals with the role played by Palestinian films in dealing with the internal situation from the point of view of the Palestinian media elite in terms of their exposure to films and the motives of this exposure and the expectation
In Iraq, because of the dramatic turnovers facing the country for three decades, pharmacists continue to experience significant professional challenges in both the public and private sectors. The present study aimed to explore the professional challenges and obstacles facing Iraqi pharmacists working in public hospitals. This qualitative study included face-to-face semi-structured interviews with open-ended questions with hospital pharmacists. The participants were selected purposefully (with ≥ 3 years of experience) to work at governmental hospitals in Karbala province between December 2022 and April 2023. The audio-recording interviews were scripted. Thematic analyses were used to generate themes and subthemes from the interview
... Show MoreThis research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show More