Persuasion is an indispensable skill in everyday life; that is why, it has aroused researchers’ interest. This study aims to investigate the most frequently used persuasive strategies in texting WHO COVID-19 Virtual Press Conferences and explore how these strategies are employed to achieve persuasive messages.To this end, a text of WHO COVID-19 Virtual Press Conferences has been chosen randomly to be analyzed based on Dillard and Shen’s (2013) “Persuasive strategies in Health Campaigns”. A qualitative method has been adopted in analyzing the selected data to investigate the credibility and validity of the persuasive strategies used in such a domain. Findings have shown that most of the persuasive appeals based on the adopted model are used, but in varying proportions. The total number of the persuasive strategies used in the data is (38) where the incentive appeals constitute 36% (14), the quantitative dissemination factors equal to 18 % (7), the one sided-vs. two-sided messages are 18 %(7), the evidence is 13 %(5), the message sources are 7 % (3), and the message qualities are 5 % (2), respectively. These frequencies show that ‘incentive appeals’ are mostly used. This is because Physical health, or factors, such as the economic, legal, psychological, social, and effort are the key dimensions of the incentive appeals. Each has a positive potential and negative evaluations based on audience’ predispositions. Accordingly, the field in which the persuasive appeals are used determines the frequent use of each one.
In order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.
The article is final after making all the modifications. 2,259 / 5,000 يهدف البحث إلى قياس وتحليل الفجوة بين الواقع الفعلي لبنود التخطيط والدعم وفق المواصفة (IATF16949:2016) في مصنع البطاريات أحد مصانع الشركة العامة لصناعة وتجهيز السيارات، وكذلك التعرف على نقاط القوة والضعف لبنود التخطيط والدعم وفق المواصفة محل البحث. ينطلق البحث من حاجة الشركة العامة لصناعة وتجهيز السيارات إلى إتباع المعايير العالمية في صناعة السيارات والمنتجات المرتبطة بها،
... Show Moreيهدف البحث الى التعرف على اثر استراتيجية نجمتين وامنية في تحصيل مادة الكيمياء عند طلاب الصف الثاني المتوسطولتحقيق هدف البحث تم اتباع المنهج التجريبي ذو الضبط الجزئي وتم تحديد مجتمع البحث بطلاب الصف الثاني المتوسط لجميع المدارس الثانموية والمتوسط التابعة لمديرية تربية الكرخ الثانية وتم اخنيار احد هذه المداس بصورة قصدية لتطبيق تجربة ابلبحث الحالي
Abstract:
Purpose\The researcher paper aims to determine the impact of information technology on the job performance, for Iraq private ban as through the use of technology dimensions of job performance.
The aim of this research: this study aims to discuss the importance of information technology and its role in achieving job performance and its impact on the Iraq banking sector design/ methodology/ approach used entrance design/methodology/approach- pilot, the questionnaire was used to collect data in order to develop a model to measure reliably and correctly to the variables of information technology and job performance, and hypotheses were tested through the use of some statisti
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreMosquitoes like Culex quinquefasciatus are the primary vector that transmits many causes of diseases such as filariasis, Japanese encephalitis, and West Nile virus, in many countries around the world. The development in the scientific fields, such as nanotechnology, leads to use this technique in control programs of insects including mosquitoes through the use of green synthesis of nanoemulsions based on plant products such as castor oil. Castor oil nanoemulsion was formulated in various ratios comprising of castor oil, ethanol, tween 80, and deionized water by ultrasonication. Thermodynamic assay improved that the formula of (10 ml) of castor oil, ethanol (5ml), tween 80 (14 ml) and deionized water (71ml) was mor
... Show MoreOne of them one of the important books due to its containing valuable information written by the author. Information include the life of the Messenger (Peace be upon him) before and during the mission and what happened to the messenger and his adherents and faithful companions (May Allah be pleased with them all)
Parmi les oeuvres d'Albert Camus, qui s'éloignent un peu de sa
tendance générale qui traite les thèmes de l'absurde ,du néant et de la
question de la mort , on trouve son recueil "l'Exil et le Royaume" 1957
qui contient six nouvelles qui sont d'une invention moins épouvantable
(le Renégat , la Femme adultère , les Muets , le Pierre qui pousse , l'Hôte
et Jonas). Ces nouvelles , à l'exception du "Renégat" , ne provoquent pas
les questions philosophiques et dialectiques qui dominent la plupart des
oeuvres d'Albert Camus , Mais ces nouvelles traitent tout simplement la
question d'homme exilé dans son existence et sa recherche perpétuelle
de son royaume.