This study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most
... Show Moreيستهدف البحث الحالي تعرف مستوى الذكاء الناجح لدى الطلبة في مدارس المتفوقين في المرحلة اإلعدادية، وكذلك تعرف مستوى الذكاء الناجح حسب متغير الجنس )ذكور، إناث(، فضالً عن تعرف لمتغير السيطرة الدماغية لدى الطلبة في مدارس المتفوقين، وتعرف السيطرة الدماغية وفقا الجنس )ذكور، ً إناث(، باإلضافة إلى تعرف العالقة بين متغير الذكاء الناجح والسيطرة الدماغية، وتم اختيار عينة عشوائية طبقية تكونت من )180( طالب وطالبة من مدارس
... Show MoreWhen talking about Andalusia in the period of time after the handover of the city of Granada, we find many historical issues thatIt deserves to be studied, including the lead plates, those plates about which opinions differed, and they formed a puzzleIt still needs to be explained in many respects.
Face recognition is a type of biometric software application that can identify a specific
individual in a digital image by analyzing and comparing patterns. It is the process of
identifying an individual using their facial features and expressions.
In this paper we proposed a face recognition system using Stationary Wavelet Transform
(SWT) with Neural Network, the SWT are applied into five levels for feature facial
extraction with probabilistic Neural Network (PNN) , the system produced good results
and then we improved the system by using two manner in Neural Network (PNN) and
Support Vector Machine(SVM) so we find that the system performance is more better
after using SVM where the result shows the performance o
Contemporary Media Stylistics permits readers to explore a variety of methodological applications to data analysis. Recent developments in technology and media communication provide linguists and stylisticians with authentic data for analysis based on real-life communication.
In recent decades, the identification of faces with and without masks from visual data, such as video and still images, has become a captivating research subject. This is primarily due to the global spread of the Corona pandemic, which has altered the appearance of the world and necessitated the use of masks as a vital measure for epidemic prevention. Intellectual development based on artificial intelligence and computers plays a decisive role in the issue of epidemic safety, as the topic of facial recognition and identifying individuals who wear masks or not was most prominent in the introduction and in-depth education. This research proposes the creation of an advanced system capable of accurately identifying faces, both with and
... Show MoreDiversity has become one of the required phenomena to be available within public organizations, in light of the changes taking place in the global and international environment and in various fields. Therefore, it was imperative to study the impact of this phenomenon in various institutions, especially public ones, in most developing countries, including Iraq. The current research aims to analyze the relationship between The demographic diversity and institutional effectiveness of a sample of workers in public institutions included (500) respondents. The questionnaires were distributed to them randomly. Diversity is considered an independent variable and institutional effectiveness a dependent variable. The researcher used interview tools a
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Depp and Heard's trial has reaped significant attention due to the domestic violence allegations directed towards each other. This paper sheds light on the repressed narrative beyond the mere words spoken aloud. It delves into an overlooked aspect, i.e., nonverbal communication. Previous studies focused on one or two categories of nonverbal communication. Therefore, the current study investigates the types and sub-types of nonverbal communication exhibited by both rivals within the courtroom setting. To examine the credibility and repressibility of nonverbal communication, the researchers have carefully watched (28) videos representing the whole trial's event. Some nonverbal communication was traced through the whole (28) videos fro
... Show MoreLynn Nottage's Ruined, a Pulitzer Prize play, tackles the plight of women’s survival during the civil war in the Democratic Republic of Congo. The play is a loud scream for the whole world to view the physical violence of women and hear their traumatic memories, hoping that this attempt might save them from their disastrous lives resulting from the brutalities of civil war. In this play, women are portrayed beyond victims of the political and armed conflicts as they serve as a reflection of a serious issue that threatens the human race in general: the continuing dehumanization whereby women are considered minorities and the “others,” even within their own society. By applying a critical analysis technique, the current paper ai
... Show MoreThe research studies the semantic generation structures of
commodity names in the Baghdad dialect of Arabic, specifically
those names that reflect popular taste. Through descriptive field
studies of the social use of these words
.
Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreThis study aims at describing the identity crisis of Diaspora people (Arab -American) in "Laila Halaby's" novel "Once in A promise Land". Halaby tackles the issues of racism, exclusion, and instability of identity that affect the Arab American community after the terrorist event of eleventh of September. She sheds light on the experiences of her significant characters Salwa and Jassim in America, clarifying how this event weakened their social position and turns their presence in America questionable. "Halaby" describes the bitterness of her characters who are induced into a dream of belonging to a land that transcends their original culture and religious values as well as their language. "Halaby" explains the subsistence in America involvi
... Show MoreEvidences indicate that human beings were preoccupied with extreme forms of mental and psychic experiences long before they were recorded in literature. Greek myths and legends appear to include symbolizations of delusions, mania, and other bizarre forms of thought and behaviuor. The figure of the mad man or woman is analogous to the wild man, or the imaginary being who appears in various forms throughout western literature and art. Various studies refer to the notion of the wild man as a response to a persistent psychological urge. This urge gives an external expression and a valid form to the impulses of reckless physical self-assertion which is believed to be hidden in all of us, but is normally kept under control. Such impulses were exp
... Show MoreThis article is part of the bigger project of my PhD thesis which investigates the influence of the British war poetry of the twentieth century on the development of Iraqi poetry in the century/Plymouth University/UK. The article examines the influences of British poetry on the development of the forms of poetry in Iraq after the Second World War. The aim is to shed the light on the creation of the ‘third product’ or the Iraqi poetry that shows the influences of the translated British poetry or the ‘second product’; which was written in prose for it is almost impossible to transfer the rhyme and rhythm of poetry from one language to another. Those who translated the poetry where also the pioneers of the major formal revolution in Ar
... Show MoreThis paper presents a 3D watermarking model based on the nearest distance between two vertices in mesh, where the embedding path moves as deep as possible until the embedding data is completed. The proposed algorithm achieved good results according to invisibility and robustness. The visibility was measured in term
of Root Mean Square Error (RMSE) and Hausdroff Distance (HD), which obtained good results. As related to robustness, the proposed method showed resistance to geometrical attack (translation, scaling and rotation) as well as acceptable resistance to signal processing attacks like noise addition and simplification.
This study aims at shedding light on the linguistic significance of collocation networks in the academic writing context. Following Firth’s principle “You shall know a word by the company it keeps.” The study intends to examine three selected nodes (i.e. research, study, and paper) shared collocations in an academic context. This is achieved by using the corpus linguistic tool; GraphColl in #LancsBox software version 5 which was announced in June 2020 in analyzing selected nodes. The study focuses on academic writing of two corpora which were designed and collected especially to serve the purpose of the study. The corpora consist of a collection of abstracts extracted from two different academic journals that publish for writ
... Show MoreIn many areas, such as simulation, numerical analysis, computer programming, decision-making, entertainment, and coding, a random number input is required. The pseudo-random number uses its seed value. In this paper, a hybrid method for pseudo number generation is proposed using Linear Feedback Shift Registers (LFSR) and Linear Congruential Generator (LCG). The hybrid method for generating keys is proposed by merging technologies. In each method, a new large in key-space group of numbers were generated separately. Also, a higher level of secrecy is gained such that the internal numbers generated from LFSR are combined with LCG (The adoption of roots in non-linear iteration loops). LCG and LFSR are linear structures and outputs
... Show MoreAnimation is an industry that is expanding more quickly than ever. Every child’s favorite activity is watching cartoons. Therefore, it is essential to be cautious of the kinds of cartoon films children and teenagers tend. Because children and teenagers are the target audience for these films. This study aims at exposing a hidden enactment, namely racism, in a well-known cartoon film, Lion King, which has been selected accurately by the researchers because it shapes a set of ideas about black people and constructs prejudiced beliefs in their minds. This study is to answer the inquiry ‘Is the ideology of racism imposed in Lion King? And how?’ The significance of the present paper lies in highlighting the educational function of
... Show Moreيعد موضوع إمارة الحج من الموضوعات المهمة في التاريخ الإسلامي، فهو يتعلق بأحد أركان الإسلام، ومسؤولية إقامة الحج وإمارته كبيرة، ومن الأسباب التي كانت وراء اختيار عنوان هذا البحث " إمارة الحج في عهد الخليفة أبي العباس السفاح"، أن الموضوع يقع ضمن دائرة اهتمامنا في متابعة إمارة الحج في الدولة العربية الإسلامية، لاسيما إننا بحثنا الموضوع ذاته في دراسات سابقة . وقد تناولنا إمارة الحج حتى نهاية الدولة الأموية
The current research aims to: 1- Identify the emotional sensitivity of children from the parents' point of view. 2- Identifying the differences in the emotional sensitivity of children from the parents ’point of view, according to the parents’ gender variable (father - mother). The basic research sample consisted of (285) male and female students from the sixth grade (primary school), chosen in a randomized stratified method from the districts (Al-Karkh and AlRasafa). While the sample of statistical analysis amounted to (200) father and (200) mothers of male and female students who were randomly selected from the sixth grade of the education directorates (Al-Karkh and Al-Rasafa). The two researchers also used a number of sta
... Show MoreThe study used analytical and descriptive methodology in ministry of education and educational institutions in Baghdad. While the digital transformation was studied as independent variable with four dimensions, knowledge creation on the other hand was examined as dependent variable with five dimensions .The study aims to unearth the digital transformation and its reflections on knowledge creation as well as to identify the digital roles of educational institutions. Furthermore, the study sought to identify the reflections of digital transformation in the education system, particularly the ministry of education.
This study aims at evaluating the performance of MA students in the College of Education for Women in using the digital transformation and identifying the significant difference in performance evaluation according to the variable of academic qualification (Master or PHD). In order to achieve the aim of the research the researcher prepared a questionnaire of 20 items, and this happens after the researcher's getting acquaintance of the literature of previous studies related to the variable of the research. The apparent validity of the items was examined by exposing them to 10 juries specialized in education, psychology and evaluation and measurement. The stability of the items was examined via two methods, the test-repetition and half-divisio
... Show Moreهدفت الدراسة إلى التعرف على الحيوية الذاتية فضلاً عن التعرف على الفروق في الحيوية الذاتية بين الطلبة على وفق متغير الجنس (ذكر – انثى) والمرحلة الدراسية (أول-رابع) والتخصص الدراسي (علمي-انساني)، تألفت عينة الدراسة من (120) طالبا وطالبة من طلبة الجامعة، وتم تطبيق مقياس الدراسة -مقياس (الحيوية الذاتية) وهو (من إعداد الباحثة)، وقد اسفرت نتائج الدراسة عن: - إن طلبة الجامعة يتمتعون بدرجة عالية من الحيوية الذاتية. - وجود ف
... Show More