The press release plays an important role in understanding and recognizing the policy of governments by the public in managing the state, especially in times of crises, as it helps to clarify the position of the government and its decisions.In addition, it is considered as one of the most important tools of communication between the government and its public at the present time.
In light of the technical developments and adopting modern mechanisms in transferring of what is issued by the government, the press release has been edited and published electronically; and helps in the success of this transfer speed and knowledge of the reactions of the masses towards the implications,In a crisis like the Basrah crisis in particular, the Iraqi government used the statement a lot as it is the official window that the government overlooks its people ,On the same side, the Public Relationsas a department or office is responsible for issuing these statements provided that the press release is carrying the solutions, conveying the government's position and decision.
Based on this, the issue of this research was to identify the most important contents addressed in the data and to know whether there is coordination and agreement between the issuers and the elements of manifestation adopted by those statements ,Therefore, this study aims to identify the contents of press releases used by Public Relations in editing the government statements on the crisis in Basra. The researcher has used the descriptive approach, which she considered the most appropriate to come up with accurate results and indicators of the study, The researcher also used the content analysis tool, which is one of the most important methods used in descriptive research.
The researcher reached a number of results, the most important of which is the lack of public service suffered by the public of Basrah, which they demonstrated for, namely water, electricity, unemployment and the agreement of the vast majority of statements in Tahrir. They agreed to stand by the protests if they were peaceful and non-violent.
It also drew attention to the statements to develop solutions to the existing crisis; or to mitigate its sharpness, whether to apply these solutions over a long time, or cost a lot; or they formed a system of solutions that may advance the reality of Basrah service.
Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.
The Weibull distribution is considered one of the Type-I Generalized Extreme Value (GEV) distribution, and it plays a crucial role in modeling extreme events in various fields, such as hydrology, finance, and environmental sciences. Bayesian methods play a strong, decisive role in estimating the parameters of the GEV distribution due to their ability to incorporate prior knowledge and handle small sample sizes effectively. In this research, we compare several shrinkage Bayesian estimation methods based on the squared error and the linear exponential loss functions. They were adopted and compared by the Monte Carlo simulation method. The performance of these methods is assessed based on their accuracy and computational efficiency in estimati
... Show More
In this paper, we introduce and study new types of soft open sets and soft closed
sets in soft bitopological spaces (X,~ ,~ ,E) 1 2 , namely, (1,2)*-maximal soft open
sets, (1,2)*-maximal soft (1,2)*-pre-open sets, semi (1,2)*-maximal soft (1,2)*-preopen
sets, (1,2)*-maximal soft closed sets, (1,2)*-maximal soft (1,2)*-pre-closed
sets, (1,2)*-minimal soft open sets, (1,2)*-minimal soft (1,2)*-pre-open sets, (1,2)*-
minimal soft closed sets, (1,2)*-minimal soft (1,2)*-pre-closed sets, and semi (1,2)*-
minimal soft (1,2)*-pre-closed sets. Also, properties and the relation among these
concepts have been studied.
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreThe present article discusses innovative word-formation processes in Internet texts, the emergence of new derivative words, new affixes, word-formation models, and word-formation methods. Using several neologisms as an example, the article shows both the possibilities of Internet word-making process and the possibilities of studying a newly established work through Internet communication. The words selected for analysis can be attributed to the keywords of the current time. (In particular, the words included in the list of "Words of 2019") there are number of words formed by the suffix method, which is the traditional method of the Russian word formation. A negation of these words is usually made thro
... Show MoreLos nombres propios nombran a un ser o a un objeto, distinguiéndolo de los demás seres de su misma clase, se escriben siempre con letra mayúscula a principio de palabra. Los lingüistas hacen mayor hincapié en las divergencias de referencia, entre nombres propios y nombres comunes. Así, suele decirse que el sustantivo propio no tiene como referente ningún concepto. El asunto de la traducción de los nombres propios parecería una cuestión de gusto personal del traductor pero vemos también que en algunas épocas es más frecuente traducirlos, y en otras, por el contrario, se prefiere dejar esos nombres en su forma original, tal vez con algunas adaptaciones ortográficas. Parecería entonces cuestión de modas. Pero, eviden
... Show MoreBackground: Dorsal plication on each side of the penis at the 2 and 10-o’clock positions had been a mainstay for correction of ventral penile curvature. However, because only the 12-o’clock position proved to be a nerve-free zone, dorsal plication at the 12-o’clock position can be advocated.
Objectives: To evaluate tunica albuginea plication with and without neurovascular bundle mobilization in patients with ventral penile curvature. Type of the study: A prospective study.
Methods: A 34 patients with a mean age of (4.8 ± 0.54) years, Who still
This paper deals with testing a numerical solution for the discrete classical optimal control problem governed by a linear hyperbolic boundary value problem with variable coefficients. When the discrete classical control is fixed, the proof of the existence and uniqueness theorem for the discrete solution of the discrete weak form is achieved. The existence theorem for the discrete classical optimal control and the necessary conditions for optimality of the problem are proved under suitable assumptions. The discrete classical optimal control problem (DCOCP) is solved by using the mixed Galerkin finite element method to find the solution of the discrete weak form (discrete state). Also, it is used to find the solution for the discrete adj
... Show More