Peer-Reviewed Journal
Manipulation is a discursive concept which plays a key role in political discourse by which politicians can impose some impact on their recipients through using linguistic features, most prominent of which are personal pronouns (Van Dijk, 1995). The aim of this study is to investigate how politicians utilize the personal pronouns, namely; We and I and their possessive forms as a tool of manipulating the audience's mind based on Van Dijk's "ideological square" which shows positive-self representation and negative-other representation (Van Dijk,1998:p.69). To this end, American President Donald Trump's 2020 State of the Union speech was chosen to be the data of analysis. Only (8)
... Show MoreTechnologies of the theatre show elements get great transferring concerning the creative embodiment of its aesthetic elements including its raws, forms, parts and masses in an attempt to achieve the prin cipal expressive progress to embody the main theme of the idea and the intended subject .
This is within the criterion of supporting the way to deal with technologies (décor elements , lighting music tones vocal affects , fashion and makeup) that achieving the emagintional appropriate atmosbheres which the writer and the director of the theatre show aim to make it present and succeed by furming active participation tunches of the ability of the cinogra . phic – element dsigners in order to invlve the theatre space atmospheres in cl
This paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreAdsorption techniques are widely used to remove certain classes of pollutants from waters, especially those that are not easily biodegradable. Dyes represent one of the problematic groups. The removal of methyl green from waste water using bamboo was studied in batch and continuous system. In batch system equilibrium time and adsorption isotherm was studied at different concentrations (5, 10, 15, 20, 25 and 30 ppm) and 50 mg weight of adsorbent.
Langmuir and Freundlich equations were applied for adsorption isotherm data. Langmiur equation was fitted better than Freundlich equation (R2=0.984 for Langmuir equation).The maximum percentage dye removal obtained 79.4% and adsorption capacity was 15.5 mg/g. For continuous system the breakthr