Journalistic discourse is a fertile through which most of the segments of the society interact in all their platforms: intellectual, cultural, social, and various settings between the vital structures of the state; which makes it the link between the groups and segments of the society.
The role of discourse, moreover, engages in a vital way by establishing a culture of debate on controversial issues that provided a space in the different visions and differing perceptions on how to formulate the discourse and the magnitude of vocabulary for the diagnosis of these issues. Since there is no system of any community empty of the emergence of issues reflecting the public interest which is necessary is reflected in the context discourse
... Show MoreThe study aims at figuring out the intended meaning of intonation in some English conversational utterances together with identifying pitch variations that are determined by various syntactic constructions that impart the same illocutionary force of utterances. However, intonation is needed to delimit the communicative forces of utterances by virtue of its structure which the speakers intend to convey .This paper consists of four sections .Section one deals with phonology and its types .Section two discusses intonation in relation to style , forms and functions. Section three sheds some light on pragmatics. Section four deals in details with the intended meaning of intonation in some English conversational utterances. This paper comes up wi
... Show MoreThe new sustainable development goals set by the UN include a goal of making cities inclusive, safe, sustainable, and resilient. Cities are growing at huge rates, and conditions of deteriorating QOL̛s are increasing in the form of poor access to services, and slums are remarkable, especially in the cities of the Middle East; hence, the research problem can arise from a lack of knowledge regarding the in determination of a way to assess the resilience of cities to develop mechanisms that will improve the quality of urban life. In this study, a tool called CRF has been applied for the assessment of the city's resilience principles of health and quality of life, economics and social, infrastructure and environmental systems, and the principle
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The study intends to explore the obstacles that encounter a program of rehabilitating released prisoners as perceived by prisoners themselves in tubas' province. To this end, the researcher used a questionnaire as an instrument which was applied on (150) prisoner had chosen randomly to collect the study data. The findings revealed no significant differences among obstacles the encounter program regarding to the following variables: age, detention period, and number of detention, additionally, the findings found that there is a variance of obstacles mean according to the prisoners themselves, rehabilitation program, and the facility of that program.
Modern automation robotics have replaced many human workers in industrial factories around the globe. The robotic arms are used for several manufacturing applications, and their responses required optimal control. In this paper, a robust approach of optimal position control for a DC motor in the robotic arm system is proposed. The general component of the automation system is first introduced. The mathematical model and the corresponding transfer functions of a DC motor in the robotic arm system are presented. The investigations of using DC motor in the robotic arm system without controller lead to poor system performance. Therefore, the analysis and design of a Proportional plus Integration plus Divertive (PID) controller is illustrated.
... Show More